Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 18:20

General

  • Target

    bcae4ab13f05e206b4695750b872d937_JaffaCakes118.exe

  • Size

    320KB

  • MD5

    bcae4ab13f05e206b4695750b872d937

  • SHA1

    d2901b00e17c19a12f3ee2281fa5c44eb800e312

  • SHA256

    f4305d3e5579c51d07d35bd6f7533288baafb61e01099f2851e0d9286ec43986

  • SHA512

    3d76da030487ef13983702c71417a877559d4591211e26893898d628a70a045ce48b48d52f96162882056ebef31923a58b75142b84b1faa8594102cb04f3a257

  • SSDEEP

    6144:1KfrQgp00CzhrdXKHBHBzrOL52K0ZcCLCgXlwRkyqoS:v+1+d6hhzidp9CLCgXi2joS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcae4ab13f05e206b4695750b872d937_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bcae4ab13f05e206b4695750b872d937_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\FPFIUX.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2320
  • C:\Program Files (x86)\Ree\Rem.exe
    "C:\Program Files (x86)\Ree\Rem.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 34026
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      PID:2028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Ree\Rem.exe

          Filesize

          320KB

          MD5

          bcae4ab13f05e206b4695750b872d937

          SHA1

          d2901b00e17c19a12f3ee2281fa5c44eb800e312

          SHA256

          f4305d3e5579c51d07d35bd6f7533288baafb61e01099f2851e0d9286ec43986

          SHA512

          3d76da030487ef13983702c71417a877559d4591211e26893898d628a70a045ce48b48d52f96162882056ebef31923a58b75142b84b1faa8594102cb04f3a257

        • C:\Users\Admin\AppData\Local\Temp\FPFIUX.bat

          Filesize

          218B

          MD5

          2f7b0a95d79a61b050ebad7bce480d5b

          SHA1

          d210bc31f9d9e16607814b70d8f9ec0c2b06925b

          SHA256

          cf44fa785b2cf3b6c4db1b28139774fab0a72a56849722a0958b977e33369b39

          SHA512

          a164bf0aeb7cf5442e16b722d3d5bc4f1845f940884ce52f438499f8e8be9501d2a0dc4920f3068e97220f4d438eddbe2388da7ca088abdcd82d94b8daca9975

        • memory/2260-0-0x0000000010000000-0x00000000100A3000-memory.dmp

          Filesize

          652KB

        • memory/2260-1-0x0000000000270000-0x0000000000271000-memory.dmp

          Filesize

          4KB

        • memory/2260-16-0x0000000010000000-0x00000000100A3000-memory.dmp

          Filesize

          652KB

        • memory/2264-5-0x0000000010000000-0x00000000100A3000-memory.dmp

          Filesize

          652KB

        • memory/2264-6-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB

        • memory/2264-18-0x0000000010000000-0x00000000100A3000-memory.dmp

          Filesize

          652KB