Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 14:40

General

  • Target

    bc27b2a0eadea556f1ece9fcd1fe0e84_JaffaCakes118.exe

  • Size

    652KB

  • MD5

    bc27b2a0eadea556f1ece9fcd1fe0e84

  • SHA1

    de52caf05c03f4457e303be2d6b9e5fcbb3feacf

  • SHA256

    175121d42f14bd5b032c67e513bab060ff2010adc9372ae49b23b6bafc2ebedd

  • SHA512

    cbdb878ba7be95d555418eedda29ab5f82dea559c1e3bf0657abbdc5d93a0c0ccca6ba14330061f90cd233bd3915f292fa7e276feb289a00186c140496f73093

  • SSDEEP

    12288:UsAqMGHGSX1388BxGVILSY4oSe8lUzXvJlzosZbain+1rx7G6obHtUDDaEk:UsBbWOSY4He8KXxxN+i+N6LtUDLk

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc27b2a0eadea556f1ece9fcd1fe0e84_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc27b2a0eadea556f1ece9fcd1fe0e84_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\concp32.exe

    Filesize

    662KB

    MD5

    aea1bca8901f334a08a4a8558c854497

    SHA1

    758451d296ba0ebdb76525e7c41e749db4d1e887

    SHA256

    58b349b91c5305758ec39b9602c7b20a6f3b59dc7c9d96d3b54c095879a1db52

    SHA512

    273a9300f90524fd06c03b92a2571a896fefbca1143dec21efd860d28bd9fbec30637bcba2351d9c577815d4125c57f3b40ad15bff88364cc7ac2e9392629787

  • C:\Windows\svchost.exe

    Filesize

    654KB

    MD5

    23e50c62cde3e556c367384bd2a87f45

    SHA1

    ea84ecb067aea5e81ea9581b01fcad22c87a0598

    SHA256

    15041094e19790fc3e62e9d34276c895ed889a87ce6459df81843234331ccd64

    SHA512

    95ecf65ad0e8f3075cdc9694af5e5df1933f65eb111a6b3d1764586ad76252ecc20b027225e060132efa555b856f1c5ea37a275afce7a10b5e110e170295e966

  • memory/2368-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2368-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2844-15-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB