Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 10:00

General

  • Target

    b306939fa05069a0b51e184a5f6b9574_JaffaCakes118.exe

  • Size

    710KB

  • MD5

    b306939fa05069a0b51e184a5f6b9574

  • SHA1

    7c0acc9cb2633b568aabdc92f5de8f5ce4425d56

  • SHA256

    da0c688b82f20df4804156eac2e983d8607061494366c0fd9166fbf93df92250

  • SHA512

    7530f2246e4fca400fb0f7abc287b0764446df5eaa3ba61ae88699175e2e106e7635b0bd1905fa548087de08ec8caffbe15e4211c1d521f2055611e12ca7aed5

  • SSDEEP

    12288:7s/bqLW3ywYdJ7JZyw8JUOYDBVg83XyhQH3+yqvOQJBxME5QNAxs162u:7s/b0tr7JEw8JnYDBS83EQ2nq0Qza

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b306939fa05069a0b51e184a5f6b9574_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b306939fa05069a0b51e184a5f6b9574_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2484
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:3436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      710KB

      MD5

      b306939fa05069a0b51e184a5f6b9574

      SHA1

      7c0acc9cb2633b568aabdc92f5de8f5ce4425d56

      SHA256

      da0c688b82f20df4804156eac2e983d8607061494366c0fd9166fbf93df92250

      SHA512

      7530f2246e4fca400fb0f7abc287b0764446df5eaa3ba61ae88699175e2e106e7635b0bd1905fa548087de08ec8caffbe15e4211c1d521f2055611e12ca7aed5

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      74e08186d62cc55e62c9e25383c1651c

      SHA1

      0e6c44a39ea11bf95030cf4d66bc53fe1170b71a

      SHA256

      a2165b9f0874c18b30eb50fc8fa9802da7cf4917a195728659157793e515744a

      SHA512

      0ec431b073367d3fbb2408c4fc7eb316dd72a87e575d7fe01a8aaba091a30bb90fdd0adcba2e17a6aa753a11e8dcf8e2e01756d9ac55f89bd7b3a752e642278b

    • memory/2648-0-0x0000000000400000-0x00000000004CD400-memory.dmp

      Filesize

      821KB

    • memory/2648-1-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/2648-10-0x0000000000400000-0x00000000004CD400-memory.dmp

      Filesize

      821KB

    • memory/4524-6-0x0000000000400000-0x00000000004CD400-memory.dmp

      Filesize

      821KB

    • memory/4524-7-0x00000000005C0000-0x00000000005C1000-memory.dmp

      Filesize

      4KB

    • memory/4524-12-0x0000000000400000-0x00000000004CD400-memory.dmp

      Filesize

      821KB

    • memory/4524-14-0x00000000005C0000-0x00000000005C1000-memory.dmp

      Filesize

      4KB