Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 04:23

General

  • Target

    b2169ebc7cc119b5f14eb8b160b935aa_JaffaCakes118.exe

  • Size

    61KB

  • MD5

    b2169ebc7cc119b5f14eb8b160b935aa

  • SHA1

    384b564ea5abb4fa61a994dbd7fe11741b028c5a

  • SHA256

    ec09dcebf30d5a81471f7fc11ae3d73bfa3274a2a54a0652af2b8f4bbd644ed3

  • SHA512

    b3b0afc59b13bad3779157cc7f5e85b560a643c0072e89a952eaa0e3bc10efbb6e7deffbabf5f8c6abcb89fc194b58c276cb266192d48c7cbf0d86db5437fb2c

  • SSDEEP

    1536:0syqFg9iyJK8GcVYBOHyzSskaP3TvswppJuZ:0J9pVaotuzsuLuZ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 21 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2169ebc7cc119b5f14eb8b160b935aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b2169ebc7cc119b5f14eb8b160b935aa_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\regedit.exe
      "C:\Windows\System32\regedit.exe" /s C:\Windows\system32\update.reg
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Runs .reg file with regedit
      PID:3060
    • C:\Windows\SysWOW64\mspaint.exe
      C:\Users\Admin\AppData\Local\Temp\b2169ebc7cc119b5f14eb8b160b935aa_JaffaCakes118.exe
      2⤵
        PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\update.reg

      Filesize

      6KB

      MD5

      feea26cecdab79470a499d87975d55eb

      SHA1

      daa7a2d670244c5644f7e92342caefa6b57d73f0

      SHA256

      90e9058ab389c3cb63e84bed9249abbda8398ccd081e38303cb0ea4bab8e95f1

      SHA512

      3de44f863abda4337fe2a862459648999805ae8ed418bc3da7fb394160e81aecfd606897de2499c5068b4a1a7ef9bb5721af0cf2183ef8a18610c55c5463d07a

    • memory/1688-0-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1688-4-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2756-9-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2756-7-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2756-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB