Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 01:08

General

  • Target

    b9c46b8c49cf097b147c50426d38fa5f_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    b9c46b8c49cf097b147c50426d38fa5f

  • SHA1

    390b8daab85ca5829f4ea660dcd85bce0c08fe02

  • SHA256

    79f6102d7a2ffed730eb054ddd029b8cb075d6fb103c74e53667b2b725f044a2

  • SHA512

    6c4dddf8c1bf5fdeb5af0c3140ab31786450e954432a2776092a978391dcb7e5a530d1d342a831d83aedc72707ff89fc8d9236816056ebfe0fe0caf59c2fd6d1

  • SSDEEP

    49152:OFUcx88PWPOpX0SFeu7QJrhMhLY1b6tegqO0r7ZZVLK91TvvyGc:O+K88uPCHF8JtCMV4ZqF7Rs1TvvyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c46b8c49cf097b147c50426d38fa5f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c46b8c49cf097b147c50426d38fa5f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\72EF.tmp
      "C:\Users\Admin\AppData\Local\Temp\72EF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b9c46b8c49cf097b147c50426d38fa5f_JaffaCakes118.exe 1946926AF8D95AA445D185B83F49554518AB761A11917B30FD7F0C93E3EBFCE1EFF9D086D8BE38ED5DDE6AAFEEB0E5716B0EB6B8582297BF783584F7621D9EF0
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b9c46b8c49cf097b147c50426d38fa5f_JaffaCakes118.docx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b9c46b8c49cf097b147c50426d38fa5f_JaffaCakes118.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\72EF.tmp

    Filesize

    2.0MB

    MD5

    ae544a52d399fc581ffdf62e8b700b22

    SHA1

    37ab81ba8c945cee54fce56b423c55d97f7d94de

    SHA256

    357cd27eee2898ec3dce9b9d78b1ae5fd1713c52ea8b0a61c79d5e6d43bde952

    SHA512

    e06dcdc27b045beec041246475db2aa9499c1e603589eadc54dc8e30496bea13f4b3ac23a8bbf79c09150933f61007b7f21f461d59bdcad553aeab1dc7e0e02b

  • memory/2732-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2800-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-9-0x000000002FCC1000-0x000000002FCC2000-memory.dmp

    Filesize

    4KB

  • memory/2884-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2884-11-0x00000000717ED000-0x00000000717F8000-memory.dmp

    Filesize

    44KB

  • memory/2884-14-0x00000000717ED000-0x00000000717F8000-memory.dmp

    Filesize

    44KB