Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 14:10

General

  • Target

    af87fe569946983c8ab95eac56199718_JaffaCakes118.exe

  • Size

    424KB

  • MD5

    af87fe569946983c8ab95eac56199718

  • SHA1

    0398a98ffc07ae45d3bc9d146b11dc0756c469b6

  • SHA256

    32b766266b21d0dcd17d5cb970851a0190d4deac12fda3d9ec0f48f935a05840

  • SHA512

    cc6ee3d989955df4123bfec70973a1cf5e69ef839ab2ddfb5eda8c8fa9e208a552d53e939691792b82341bf35e2b666507fe5754d0b360d6ae4d867bb78dcdce

  • SSDEEP

    6144:VLR7fAlQ3sdDPp1rxuSSQKM8M0Rn7hnwz7Ep:Vl7fOjdbdurMv0NhnO7Q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af87fe569946983c8ab95eac56199718_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\af87fe569946983c8ab95eac56199718_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Roaming\GoogleUpdate.exe
      "C:\Users\Admin\AppData\Roaming\GoogleUpdate.exe" 0
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\GoogleUpdate.exe

    Filesize

    424KB

    MD5

    af87fe569946983c8ab95eac56199718

    SHA1

    0398a98ffc07ae45d3bc9d146b11dc0756c469b6

    SHA256

    32b766266b21d0dcd17d5cb970851a0190d4deac12fda3d9ec0f48f935a05840

    SHA512

    cc6ee3d989955df4123bfec70973a1cf5e69ef839ab2ddfb5eda8c8fa9e208a552d53e939691792b82341bf35e2b666507fe5754d0b360d6ae4d867bb78dcdce

  • memory/2148-0-0x0000000074CD1000-0x0000000074CD2000-memory.dmp

    Filesize

    4KB

  • memory/2148-1-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/2148-2-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/2148-14-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/2304-12-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/2304-13-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/2304-15-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/2304-16-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB