Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 16:14

General

  • Target

    bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe

  • Size

    128KB

  • MD5

    bef8b24a626d99a3d41257061679339e

  • SHA1

    e7eb63483cf9161860ec4800db41280644485e8f

  • SHA256

    f0934dce9880901a78ecee869dc30e73e7590139d61dac76253d1fc2aa40dfdf

  • SHA512

    8ad92946f15c078c4eccb2cccf0a429b540aee68d454e8b01e825ec3f083ac960d1d785daac73e6bf32f6ea4b73298a4f4413627c1cec8751a54c135344fa524

  • SSDEEP

    3072:Hk5befKvym0qeWLnsi5VildHCzU4tf0dj0Sq9Fv8S4LBtlu2h8Zshri:Hkptym7Lsi5VgBCDGjqFv8Ff0cr

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:492
    • C:\Users\Admin\AppData\Local\Temp\bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe"
      1⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\Documents\~tmp00156.exe
        C:\Users\Admin\Documents\~tmp00156.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 92
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:2060
      • C:\Users\Admin\Documents\~tmp00157.exe
        C:\Users\Admin\Documents\~tmp00157.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2404
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\DOCUME~1\~TMP00~2.EXE > nul
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\~tmp00156.exe

      Filesize

      46KB

      MD5

      69cef5c918cb4812d31cd400986e3948

      SHA1

      ee8a10e13a9f23ae79e44ebe74a6804aa32a651f

      SHA256

      91eb03d1d0b11b4d5a5b458b9bd2e01d5783c9cf21fa4bce2f0b49f27cb43535

      SHA512

      2ed02bd5e0d1012faf9ee7239060a82c7f6c315178fecdd729b8472763d71cab8133d622fe0a3f3c79375f346a156bbb6342151800ab8aa01eafb252bc7e6f49

    • \Users\Admin\Documents\~tmp00157.exe

      Filesize

      51KB

      MD5

      41530477eeed6290291232f894032330

      SHA1

      f1dc8c8afab51e6836157d21731ddb51b9534090

      SHA256

      f1faf01bd350aa0038202b416f0b06c0e0fc5bfae30ddf07b3d63c6aed4e5ea9

      SHA512

      6ef9513653da16e91661f4cbd10ceb8809bbf841e070b9a4b72acee15df64cf394088e66bd4ce16bd96544b8788a07c31a6f5c06435f9694aa4939e78a410f57

    • memory/492-28-0x00000000009E0000-0x00000000009E1000-memory.dmp

      Filesize

      4KB

    • memory/1792-10-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/1792-33-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2404-29-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB

    • memory/2444-8-0x0000000000230000-0x000000000024D000-memory.dmp

      Filesize

      116KB

    • memory/2444-7-0x0000000000230000-0x000000000024D000-memory.dmp

      Filesize

      116KB

    • memory/2768-25-0x00000000001B0000-0x00000000001C0000-memory.dmp

      Filesize

      64KB

    • memory/2768-26-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2768-32-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB