Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 16:38

General

  • Target

    bc820c3e134511acf5057108cdd7ca32_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    bc820c3e134511acf5057108cdd7ca32

  • SHA1

    f66a7fba645487dd882062885152e3ad42340263

  • SHA256

    588e2d15616286f9913b3b745e1aa0bce81e5d39c8ed5bdffa5368e50e4f0e08

  • SHA512

    826d1d3cd7d4c415be400a8b1a6e619af614ca7e3cbc715fd617b2fd5b549351fad6d49aad30338a02aae851e5eeaf19eeb6770174afa5aea026b12e52427a34

  • SSDEEP

    3072:3g1CWNK1z6eFlN7mkJkQZ3s8BgP9pG35g6AX/HganJC2HdkCsxxXDO5WmS+:3g15NpylNakqQNrObc5yX/HgaJCVpzXK

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc820c3e134511acf5057108cdd7ca32_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc820c3e134511acf5057108cdd7ca32_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Roaming\SysWin\lsass.exe
      "C:\Users\Admin\AppData\Roaming\SysWin\lsass.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\SysWin\lsass.exe

    Filesize

    188KB

    MD5

    bc820c3e134511acf5057108cdd7ca32

    SHA1

    f66a7fba645487dd882062885152e3ad42340263

    SHA256

    588e2d15616286f9913b3b745e1aa0bce81e5d39c8ed5bdffa5368e50e4f0e08

    SHA512

    826d1d3cd7d4c415be400a8b1a6e619af614ca7e3cbc715fd617b2fd5b549351fad6d49aad30338a02aae851e5eeaf19eeb6770174afa5aea026b12e52427a34

  • memory/1628-0-0x0000000000220000-0x000000000024D000-memory.dmp

    Filesize

    180KB

  • memory/1628-1-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1628-9-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1932-11-0x0000000000220000-0x000000000024D000-memory.dmp

    Filesize

    180KB

  • memory/1932-12-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1932-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB