Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 22:47

General

  • Target

    bd78a615fb2817c794a5a5e28c1683ff_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    bd78a615fb2817c794a5a5e28c1683ff

  • SHA1

    793c3af5fd33d38d069428be437a9cca38297a5e

  • SHA256

    19455e4df3545d05a0e3de4cd0e6a640237493bf6095fdcc5f2819d5b40f3e4a

  • SHA512

    dc2e055583244c31a627ec1e133e9689868afd7e4e603cc86d141507251704c399f117e5e991fc7c5c040d7573b228793be898abf81274b7ceaa24f33efcf507

  • SSDEEP

    6144:3pG2kb+Kdt6TGT3kVrKHXRuq/ce2xFaZ8E40xugx+bPeM40SGxS3:SEyT0VrKMgDoC8E4+ug0bvvNxu

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd78a615fb2817c794a5a5e28c1683ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd78a615fb2817c794a5a5e28c1683ff_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\ProgramData\aIaNc01805\aIaNc01805.exe
      "C:\ProgramData\aIaNc01805\aIaNc01805.exe" "C:\Users\Admin\AppData\Local\Temp\bd78a615fb2817c794a5a5e28c1683ff_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\aIaNc01805\aIaNc01805.exe

    Filesize

    312KB

    MD5

    a2c49c2dbc0d03b9662d55fb523241bf

    SHA1

    575be0c041f2272ee05dfef9d5b61389a74673f2

    SHA256

    361e695cac06ba551034e0326da0862dbb08839504f3e19cb9e37fd1740f30bb

    SHA512

    0247dd5149fca37ce05ce52979b12df89f268456b82d7103eab562ca505d3b30a9ae5c0272d41c4078cf31e65a427ba24a0f0dd1bfca84a86e61ddc7f2644369

  • memory/1932-0-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1932-4-0x0000000000467000-0x00000000004AF000-memory.dmp

    Filesize

    288KB

  • memory/1932-2-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1932-5-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1932-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1932-25-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1932-29-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2200-22-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2200-27-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2200-35-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB