Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 14:26

General

  • Target

    b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    b3d29ddfe886d03db79136357770f5a4

  • SHA1

    f45df5d205c8515f8c5648f3632901fedabd6420

  • SHA256

    b7f599591f3ed049ad9ff9bda207db9a9b153e4906a177cd92ced70a687089ea

  • SHA512

    d5b209f183c3941c550b15c77ff58cab7accc9be21638af9daa44abaa0fb9190a2c5f5d05e0dac73b5d62bd4866c2efc1f4ca690983b5b5d95417cb97110df4e

  • SSDEEP

    384:MkmJPIC47SMsfxwzeRn4QEQHMLm8mnF9WU6/zWn:AJN47SikyymdrU6in

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\6097.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6097.tmp.bat

    Filesize

    207B

    MD5

    2448394ed7ed1f78494ca56166eb09a5

    SHA1

    234767563ce68ae485aa008c88da959d724040df

    SHA256

    62315966f124fb064b459b3c2a3ba5ca52ca1abb0096f71fb1e1d7a5e6ed0399

    SHA512

    cc66ff45af23e55c1bddef47f4c47b69ed76d8187d577277d064ce99ac7f57ad9b6055d80aeefbb8e351aaf8008ab199d382f6a29e3cae708f518e99c3c57173

  • C:\Windows\SysWOW64\tkuufuot.tmp

    Filesize

    2.2MB

    MD5

    1179cefdd5d5e933247b99e782fdb1f6

    SHA1

    306a776cc323a9ca06fc5aa408fcda3c402f4be9

    SHA256

    3bbeca8fc9013c6813e731138eacaf5be605e19ebf169dbc954378e45904de30

    SHA512

    eec4337f11606d9976115c62c8a3afa6be607e21389c76f2f69ad7dad31512ee455170792ea191bd8c97150d341070cea2dff843e770b704bf6fe317d46c2a12

  • memory/2308-12-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2308-21-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB