Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 20:32

General

  • Target

    b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe

  • Size

    321KB

  • MD5

    b90e2c831f24541353874a1d4f4f2c31

  • SHA1

    f4979e9c7a59923a1742abec65c8c1d4dffc8b82

  • SHA256

    4628ac78bc9d1f342986f9e38dcd74892223c1b41873ac71bf4288b8819199fe

  • SHA512

    52c9c6560deb1cbc0f2b337fa47e01d1021e7d7bb60d79ed2c20a5a3b56154a43489445b8b69076238c5c107f824b6089b2f0dc90e44d4847a7cbe60a1db9aa6

  • SSDEEP

    6144:tT+FQoCd70swMHScIOq1G/PVRnC2CkErfo21:4FhCxycBqwVRC2gc21

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1228
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1276
          • C:\Users\Admin\AppData\Local\Temp\b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Users\Admin\AppData\Roaming\Ecodc\otmio.exe
              "C:\Users\Admin\AppData\Roaming\Ecodc\otmio.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2176
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f86c039.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2860
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:628
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1804

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmp7f86c039.bat

                    Filesize

                    271B

                    MD5

                    b2407f2bee98f1e499d29a8bc38b1d1d

                    SHA1

                    94301325c93fdaeb2c8b3feb2752fb4afc8da187

                    SHA256

                    0924163a17013fcedf019751c2897934f8449aee00ef76e859e49f003267c499

                    SHA512

                    7c6b8b264aef7a86478d6a8137dd587f43e241afe29d6e0366675e5460ac1d149b513916a6135d05528048c4155aa7cda5a5afef1e2460e6dd3664805693bc24

                  • \Users\Admin\AppData\Roaming\Ecodc\otmio.exe

                    Filesize

                    321KB

                    MD5

                    62bd7ea704fa1e98b25ff743bf4a5450

                    SHA1

                    34901d50f25853d1ba20b255406f619330465e14

                    SHA256

                    be6587f7dd725c6530ce3ede47ce92a34661015e15bcbde67aa4b92ed68f3f8d

                    SHA512

                    5a1a640956fd5096b8e547a7a84abec77940623618b82b0b703bcf41aa7cfe443e8b8f3c9c6412de99efe44bd4972dc065d582e01ef47f0db713a71ee78a12c8

                  • memory/628-52-0x0000000002180000-0x00000000021C4000-memory.dmp

                    Filesize

                    272KB

                  • memory/628-46-0x0000000002180000-0x00000000021C4000-memory.dmp

                    Filesize

                    272KB

                  • memory/628-48-0x0000000002180000-0x00000000021C4000-memory.dmp

                    Filesize

                    272KB

                  • memory/628-50-0x0000000002180000-0x00000000021C4000-memory.dmp

                    Filesize

                    272KB

                  • memory/1120-27-0x00000000021D0000-0x0000000002214000-memory.dmp

                    Filesize

                    272KB

                  • memory/1120-25-0x00000000021D0000-0x0000000002214000-memory.dmp

                    Filesize

                    272KB

                  • memory/1120-19-0x00000000021D0000-0x0000000002214000-memory.dmp

                    Filesize

                    272KB

                  • memory/1120-23-0x00000000021D0000-0x0000000002214000-memory.dmp

                    Filesize

                    272KB

                  • memory/1120-21-0x00000000021D0000-0x0000000002214000-memory.dmp

                    Filesize

                    272KB

                  • memory/1228-31-0x00000000001B0000-0x00000000001F4000-memory.dmp

                    Filesize

                    272KB

                  • memory/1228-35-0x00000000001B0000-0x00000000001F4000-memory.dmp

                    Filesize

                    272KB

                  • memory/1228-33-0x00000000001B0000-0x00000000001F4000-memory.dmp

                    Filesize

                    272KB

                  • memory/1228-37-0x00000000001B0000-0x00000000001F4000-memory.dmp

                    Filesize

                    272KB

                  • memory/1276-43-0x0000000004410000-0x0000000004454000-memory.dmp

                    Filesize

                    272KB

                  • memory/1276-40-0x0000000004410000-0x0000000004454000-memory.dmp

                    Filesize

                    272KB

                  • memory/1276-41-0x0000000004410000-0x0000000004454000-memory.dmp

                    Filesize

                    272KB

                  • memory/1276-42-0x0000000004410000-0x0000000004454000-memory.dmp

                    Filesize

                    272KB

                  • memory/2176-290-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2176-15-0x0000000000300000-0x0000000000344000-memory.dmp

                    Filesize

                    272KB

                  • memory/2176-16-0x0000000000350000-0x00000000003A6000-memory.dmp

                    Filesize

                    344KB

                  • memory/2176-17-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-167-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-74-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-3-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-82-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-168-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-1-0x0000000001C50000-0x0000000001CA6000-memory.dmp

                    Filesize

                    344KB

                  • memory/2544-4-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-166-0x0000000001C50000-0x0000000001CA6000-memory.dmp

                    Filesize

                    344KB

                  • memory/2544-143-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-80-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-78-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-76-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-75-0x00000000775E0000-0x00000000775E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-2-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-72-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-70-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-68-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-66-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-64-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-59-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-62-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-60-0x0000000000450000-0x0000000000451000-memory.dmp

                    Filesize

                    4KB

                  • memory/2544-57-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-58-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-7-0x0000000000400000-0x0000000000444000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-56-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-55-0x00000000022C0000-0x0000000002304000-memory.dmp

                    Filesize

                    272KB

                  • memory/2544-0-0x0000000001C00000-0x0000000001C44000-memory.dmp

                    Filesize

                    272KB