Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 06:45

General

  • Target

    b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    b6b63bfdeb1eee1d064154740bb4537b

  • SHA1

    697b051358c1bb13c6148bba465bf5730d863d3d

  • SHA256

    4777b209ee883640e1b054cf16ccae108e73be25c486c9f95ce526c34d558e33

  • SHA512

    e83d30d5df1a7e2ef7cd8e8c4c0d7b3c0cd1f9f9c4d0321ee6bd2f0db98cc61195294231b699de00447672835e302cf8aead6905846e23ccbe70a4c4eb9a7fb2

  • SSDEEP

    3072:ri0vfvw6W8fqVcAPGeAzxXlK9L7Ul9LwC3eXlozpI:rtXlWpOC7QF6aN

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\icronsa.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\icronsa.dll",iep
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\icronsa.dll

    Filesize

    116KB

    MD5

    98447652fc4ac547254da221ead0cb4d

    SHA1

    ec287547f50529026f7a5ad3a348cf4f72057609

    SHA256

    8217a7450522629305a8ce6a142c4ac4e786e178d3166506338dbf5d11b63467

    SHA512

    711ef4c7a74354886812546c80dacfb8f452fc296d1fbc0d8a60eab4025a6a6fe606db66f8fde066f94c1be595f043a37ab82fa65bda29f7a7cc37729673ce8f

  • memory/1428-13-0x00000000022A0000-0x00000000022E0000-memory.dmp

    Filesize

    256KB

  • memory/1428-4-0x00000000022A0000-0x00000000022E0000-memory.dmp

    Filesize

    256KB

  • memory/1428-3-0x00000000022A0000-0x00000000022E0000-memory.dmp

    Filesize

    256KB

  • memory/1428-0-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1428-14-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1904-12-0x0000000000950000-0x0000000000990000-memory.dmp

    Filesize

    256KB

  • memory/1904-10-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1904-11-0x0000000000950000-0x0000000000990000-memory.dmp

    Filesize

    256KB

  • memory/1904-15-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1904-23-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1904-29-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/2668-24-0x0000000000190000-0x00000000001D0000-memory.dmp

    Filesize

    256KB

  • memory/2668-26-0x0000000000190000-0x00000000001D0000-memory.dmp

    Filesize

    256KB

  • memory/2668-27-0x0000000000190000-0x00000000001D0000-memory.dmp

    Filesize

    256KB

  • memory/2668-28-0x0000000000190000-0x00000000001D0000-memory.dmp

    Filesize

    256KB

  • memory/2668-30-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB