Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 20:29

General

  • Target

    bd0be3e310836c6be38fce6f81e11658_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    bd0be3e310836c6be38fce6f81e11658

  • SHA1

    6cc9641df33cf277101e62b0050f6d6c1a1326f9

  • SHA256

    21d82dc770edea8c99aeef084250b5f8cfa5524dfb9027569ca0d126c13ea18c

  • SHA512

    bb4ebba37bb80e82ab3b79c290e0b709a826906fa2e3b5a7ba0a07a40ae6effe53ba7348be2a1aec61cf5d621d64af1cc2a21488d5be645e87413338852eebd7

  • SSDEEP

    1536:Kpjo0c6ivIXuCcpuuohgwKGl9GYS60MAfzowWvbgTghNFqcY7LMt8bYA/5xqnnDB:KpMbIXS303bGY//tnYfuHxfiiPIE

Malware Config

Extracted

Family

smokeloader

Botnet

ku11

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Loads dropped DLL 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd0be3e310836c6be38fce6f81e11658_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd0be3e310836c6be38fce6f81e11658_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 168
      2⤵
      • Program crash
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5C1B.tmp

    Filesize

    1.2MB

    MD5

    d124f55b9393c976963407dff51ffa79

    SHA1

    2c7bbedd79791bfb866898c85b504186db610b5d

    SHA256

    ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

    SHA512

    278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

  • memory/2824-5-0x0000000000380000-0x000000000038A000-memory.dmp

    Filesize

    40KB

  • memory/2824-4-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/2824-3-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB