Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 16:31

General

  • Target

    bc7c353e354e765218b474296add06d8_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    bc7c353e354e765218b474296add06d8

  • SHA1

    a9a89d9a4a5ad86f555481dd85c9cb8d566c57e8

  • SHA256

    41057df26c2ea138e06245a6cffa25b53c4c57db5c86ca683bb7bebe8454ac87

  • SHA512

    874f1b4d7759ae4a715f475dc4c9b0807ba61bac8b4e08ea0fb61a019cb4f5f7d8ac0a20ba5402eb7e25dbc0f51e386230502e3b5e08ad18dd61ae55608f026b

  • SSDEEP

    3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8x:EuwWx8fScnUPey1BtB

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc7c353e354e765218b474296add06d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc7c353e354e765218b474296add06d8_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\Tcewaa.exe
      C:\Windows\Tcewaa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    d37bbfd2e7a2482f8fc87638c60dfc12

    SHA1

    13f848165f1afbb50ad3d4e8ac30a881e553334e

    SHA256

    1fb43c74325227efee98cb2376a3999b2e56db893cfca3465b42147386813f17

    SHA512

    4ba0848359eb1f7e0b8137788b885ea34e595cc6739771c63b515ac030ef495cde51f7bc26ba2612ecbe9f45cab0d679b9eb83ab85f9a17893863522db987b32

  • C:\Windows\Tcewaa.exe

    Filesize

    125KB

    MD5

    bc7c353e354e765218b474296add06d8

    SHA1

    a9a89d9a4a5ad86f555481dd85c9cb8d566c57e8

    SHA256

    41057df26c2ea138e06245a6cffa25b53c4c57db5c86ca683bb7bebe8454ac87

    SHA512

    874f1b4d7759ae4a715f475dc4c9b0807ba61bac8b4e08ea0fb61a019cb4f5f7d8ac0a20ba5402eb7e25dbc0f51e386230502e3b5e08ad18dd61ae55608f026b

  • memory/2672-0-0x00000000001B0000-0x00000000001C3000-memory.dmp

    Filesize

    76KB

  • memory/2672-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-46439-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2672-29393-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46438-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-10-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46440-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46441-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46442-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46443-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46444-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2800-46448-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB