Analysis

  • max time kernel
    148s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 10:31

General

  • Target

    b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe

  • Size

    253KB

  • MD5

    b31ccfe53c49736376dcf64c99b38960

  • SHA1

    eacfc9ae37eb2e8f4560d532ee70669b91f9fccb

  • SHA256

    ff2594e55bb31a7db6d0059cc6066a2358d59a0d25ab89f4efacf8d2644c0af2

  • SHA512

    048ffbdf262d2e3f1a336b0922448ce67f2dfaa96768118c8daa42ea11d3fb6d20e641377bcbfcb8b462f9a19e3ecabd94b7c3e0c96a3c4f0b1a1d495a66bc49

  • SSDEEP

    6144:u2FwvQg2JnVVOXTnllzr1PiErVZMbNswsJiMI:MvJyV6xJQeVZMbNsw7MI

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files\Messager\aekz.exe
      "C:\Program Files\Messager\aekz.exe"
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Messager\1.2.8\MadPea.dll

    Filesize

    140KB

    MD5

    0bad204155a6281c8328fcb630e1dd4a

    SHA1

    1d4dd1f0829454cef4c11322a76e7a9c635ad412

    SHA256

    11a2b77cdd221606b13176ef9989f05c037489c069464b12f69d16d35019d4b0

    SHA512

    458a9f5a3fda26bb468da65d5b4695b350c25c33c14ff34f6b859b3741142b22fff4d039ce62f47d004381f6707e8ff4e27240248c32ec0dee4ada3e78e0bbcd

  • \Program Files\Messager\aekz.exe

    Filesize

    32KB

    MD5

    c7409bb97732b4e975195609f462dd29

    SHA1

    9a1c81f8931c1c3c359a6f137459e00684c81b75

    SHA256

    9ad9d997901d3bf447bb3a4088f613b6494a875b0f98b2c45010078fc620b0c6

    SHA512

    0567d286600dfc38e12e9042563a5e0cca4ddb1bff017db58f728376b81bcaa10c5af0f54c921909f9306bee0be6b6cc04fa4964c14e4c742148681a490bccad

  • \Program Files\Messager\baae.dll

    Filesize

    342KB

    MD5

    f41517d0afd7c7280da8e51da9c6433e

    SHA1

    a02a06ef8649578c1f0f9ebfdacb3cbb9949997b

    SHA256

    5d4b1c54118c5d7da3da7d0bb97a3ee2b1f0c5761a4aa8294332035fcf410589

    SHA512

    fb16561945cfb9d266096fd855ae8d246311088015e4fc2ef33bdf88ca6b85c6878b6b22ba3168487c626d221b14c6cfc911f7004567fa18ffce9ed8f7fee740

  • \Users\Admin\AppData\Local\Temp\nsj8528.tmp\System.dll

    Filesize

    10KB

    MD5

    4eff5fafd746f5decb93a44e3a3d570c

    SHA1

    a11aa7681b7e2df1c7f7492a127d332d1495ea8a

    SHA256

    cf61ddd15d63c25a12caee70f51ea736cfc02195c42e56ee01b33f689d3754c5

    SHA512

    cde82d2a1f28506e4c2264f6b82017a00af32f138ebcdbaf4cc58463870fa626f708aa57465294c5a6f096c886841e7b9112b85bf3ea2f1d8f2da816b51b2d72

  • memory/2572-30-0x0000000000B10000-0x0000000000B36000-memory.dmp

    Filesize

    152KB