Analysis

  • max time kernel
    15s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 18:00

General

  • Target

    b476cd96777247ce39ab521d009c3465_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    b476cd96777247ce39ab521d009c3465

  • SHA1

    7f34f848cc1641580e5e1d4e758dc436157191ea

  • SHA256

    1db1d962480e0a3bfd9e9ed92b79e35a7bab38a016cf96a31919bdb2271fbe1f

  • SHA512

    d19ffba05ec73ba470ed04bee8ea1705592855c242240b6304a4c5edd63c728adb168e520de6ce2030b973de435ccd8be0ccba11bb08bf664f356070ba1f581b

  • SSDEEP

    24576:cYOj+PQg1s9YvEykFW2MkoA90Klp9hWbFwAqXuftRc7x452cT/7c8i:exg+9YcykFNMOqwug7x452cT/

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b476cd96777247ce39ab521d009c3465_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b476cd96777247ce39ab521d009c3465_JaffaCakes118.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-0-0x0000000000401000-0x0000000000453000-memory.dmp

    Filesize

    328KB

  • memory/2404-5-0x0000000000401000-0x0000000000453000-memory.dmp

    Filesize

    328KB

  • memory/2404-4-0x0000000000400000-0x0000000000589000-memory.dmp

    Filesize

    1.5MB