Analysis

  • max time kernel
    7s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 10:54

General

  • Target

    b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe

  • Size

    702KB

  • MD5

    b75c6f4e544afaa44d511c9e37efab81

  • SHA1

    e7e47aad999e4c1b1af4fc113082d514e84aadf4

  • SHA256

    12ff53a12e370aa39731b6c4ea18557f4d7ddf7584eb6b34c88ed245600beeeb

  • SHA512

    d3a908f5c011493e3b87dbe8b38a0a10bcf917feb1a684a8bef9358af536e3693478100ec0188c064b0a44230e0be2a5bf3e59bfbef42c0b62e1087b33fd4496

  • SSDEEP

    12288:2mexve0N2txy3uf9ylYkiGWQQ28LQiVH2F3Z4mxxFzjZCIPZitNSpH3fq:2JIxy+EekiX2biZ2QmXRNPPZIS53fq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

    Filesize

    343KB

    MD5

    49d2063c9ee556466cb06878149bf54d

    SHA1

    513de252457743340bb94867fad6571f23f6b2d6

    SHA256

    ee9f51bb9130276beb27829ad8f7ae3f1e85e76100fbbcc6f5ce4400fe6006d4

    SHA512

    824572ed13d02db79063fd7acca3525fc38232425b4f49fea21c0d94ed4eb69ba78c12816d6489d9062a41ef874f8a49edfd3c571d6833db25d40d32d2083b5a

  • memory/1276-17-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/2608-0-0x0000000001000000-0x00000000010BD000-memory.dmp

    Filesize

    756KB

  • memory/2608-1-0x0000000001069000-0x000000000106A000-memory.dmp

    Filesize

    4KB

  • memory/2608-2-0x0000000001000000-0x00000000010BD000-memory.dmp

    Filesize

    756KB

  • memory/2608-3-0x0000000001000000-0x00000000010BD000-memory.dmp

    Filesize

    756KB

  • memory/2608-6-0x0000000001000000-0x00000000010BD000-memory.dmp

    Filesize

    756KB

  • memory/2608-13-0x0000000003860000-0x0000000003925000-memory.dmp

    Filesize

    788KB

  • memory/2608-18-0x0000000000370000-0x000000000042D000-memory.dmp

    Filesize

    756KB

  • memory/2608-19-0x0000000001069000-0x000000000106A000-memory.dmp

    Filesize

    4KB