Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 16:27

General

  • Target

    befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe

  • Size

    108KB

  • MD5

    befe4a55546c48fd3589719339f1add2

  • SHA1

    4f2a11899431dbc10212358fa86af570a2f90833

  • SHA256

    a3cd2e4d5f7302f9b5f6d802224038fd0e52139013044c531bfb614e6a2e8c87

  • SHA512

    70236f297aa9277df09766d0aa87e87dbe00b439029c055c1fe109903b17bc6add88147bb061a067f430b04e651289b8969d4243db7234a11ef9191eb8a13c57

  • SSDEEP

    1536:RySvEtQwOxcPz0wHNDYHQa/HAwai4HQHWFx7qzrzlayH+Jq3z/V2:tqPzZS9HA9i4HeYqzrzlayH+JqJ2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\system
      C:\system
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2132
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c sc start WMMNetworkGpf
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\SysWOW64\sc.exe
        sc start WMMNetworkGpf
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:1732
  • C:\Program Files\yqeyie.exe
    "C:\Program Files\yqeyie.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\windows\SysWOW64\svchost.exe
      C:\windows\system32\svchost.exe
      2⤵
        PID:1712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\yqeyie.exe

      Filesize

      10.1MB

      MD5

      ec3c0c1b727b0bac0500ec04652984d2

      SHA1

      d29b683f4984eef24c081196788d957abce53e25

      SHA256

      6ce49da9c22f16abdd3a0366559bd21388d14a47134e109ca29a0d894b5cc9ba

      SHA512

      0d5bf1f97c03221525773c0272fd04649f4ab1d0210e29900b05408b01729bfd1b47f6d5d0a62c7b795c953b074df3126e887ff6554f8717fec5b6161b925aa0

    • C:\system

      Filesize

      8.1MB

      MD5

      54e3dbc47a12596ed3788515cf3392f5

      SHA1

      a83b23d9ed521fa8b8c989e182e915920ba00472

      SHA256

      ff9f350255b4cac018535ef0eb5528fed6e34ae57f0ae930e7209c501e09c74b

      SHA512

      38ae2c496f7a235552ab5d5f17973e55698bbe6b56dc41a081d01c3eb497bbd5f78d130d9f6b45440a6520cff96d7342349b2dfcdfdba11f609eea900d7e0d30

    • memory/1712-15-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1712-13-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1712-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB