Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 21:04

General

  • Target

    bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    bd26a131b8c2ccb82bfe7e8279069e7d

  • SHA1

    c64750a53c71929d786a0e46828fd2de5e8337df

  • SHA256

    4a7e9a71df13d00579dda1ce2653229f629caf282d284f5fef7602191e32a5d3

  • SHA512

    395e884db9a32cadd7df8517858da923dcd057d58a8f13130f64e1ae545ad7c377c40a6914d6c28a955cc4dfddc350d972bb34d7246171c316236db21fe7b29d

  • SSDEEP

    768:yh/rqwViUTg5J1sMpidL02iuPyExtaprcJI3o9NbdAohD4uS9e:S/WwVv8sd9PyC8prGIiIohcZ9e

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\delme.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2272
  • C:\Windows\SysWOW64\38A5CC4C.EXE
    C:\Windows\SysWOW64\38A5CC4C.EXE -a
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\38A5CC4C.EXE

    Filesize

    28KB

    MD5

    bd26a131b8c2ccb82bfe7e8279069e7d

    SHA1

    c64750a53c71929d786a0e46828fd2de5e8337df

    SHA256

    4a7e9a71df13d00579dda1ce2653229f629caf282d284f5fef7602191e32a5d3

    SHA512

    395e884db9a32cadd7df8517858da923dcd057d58a8f13130f64e1ae545ad7c377c40a6914d6c28a955cc4dfddc350d972bb34d7246171c316236db21fe7b29d

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    233B

    MD5

    8549a13d93040971db138ae501a35e63

    SHA1

    ed7693f1066e10bb156f4a7b7520c3923485dac1

    SHA256

    e20d56953ed59981cbcf5215f702e0fab4be5a08fe7d73c7e250bf16c6eba674

    SHA512

    d4d0a03fb0e449ee2e8e6547a4a94b1f81cb6322518914afd063d14d3a2133867c42c100d6f20ff83e7f5a7bdfba5a9b5bbad37fc9477baa9a8ba3d66f113315

  • memory/2716-15-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2716-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2716-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2868-5-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2868-4-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2868-17-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB