Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 17:27

General

  • Target

    bf1a23d7a1107c2a78d2610677db521f_JaffaCakes118.exe

  • Size

    302KB

  • MD5

    bf1a23d7a1107c2a78d2610677db521f

  • SHA1

    de91c34e18b4810ea01b58439dc61ec787cf0e7c

  • SHA256

    4dbef1358adea2abe117866e0b70071fa095ba6f82b968f264f125f1134a08ce

  • SHA512

    5bdb62cdee5e2a735f5ea1a02342e70cf75aa3bac323a65c69ecb256044949e04c0e35a8c4ca7d7a0c9b808eadf02802b31c6b189a918f9ac4a8844c8441d536

  • SSDEEP

    6144:l+LjhEB1aWggNOpqY8zzBZ9iEVXZZNTlCdXxiINFYt:l+Llmdgg4nyXZZZNT6hXe

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf1a23d7a1107c2a78d2610677db521f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bf1a23d7a1107c2a78d2610677db521f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\dfsD2C9.tmp

    Filesize

    608KB

    MD5

    6ad886fddcec2a8bd3d7ff4b18bbdf04

    SHA1

    35bea8f3e88d61c37fee34411f245ba1204f27e1

    SHA256

    e31480f82305ffd0cbe33596006405ad9cc6bcbd91143ac236a180500a1996f1

    SHA512

    64c1e29aafc55e05d22dd8c3ede6b0aa3a09438c7074f699cdfed999b5197ab46466bf796e00e4c99236200d295e39fec57f1e8a7c80223fd478264a84954296

  • memory/1864-11-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/1864-23-0x000000007497E000-0x000000007497F000-memory.dmp

    Filesize

    4KB

  • memory/1864-1-0x0000000000130000-0x0000000000133000-memory.dmp

    Filesize

    12KB

  • memory/1864-7-0x0000000000970000-0x0000000000A0E000-memory.dmp

    Filesize

    632KB

  • memory/1864-8-0x0000000000330000-0x000000000033A000-memory.dmp

    Filesize

    40KB

  • memory/1864-9-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/1864-3-0x000000007497E000-0x000000007497F000-memory.dmp

    Filesize

    4KB

  • memory/1864-12-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/1864-10-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/1864-18-0x000000000AEB0000-0x000000000B656000-memory.dmp

    Filesize

    7.6MB

  • memory/1864-0-0x0000000000FF0000-0x00000000010B6000-memory.dmp

    Filesize

    792KB

  • memory/1864-24-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/1864-25-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/1864-26-0x0000000000FF0000-0x00000000010B6000-memory.dmp

    Filesize

    792KB

  • memory/1864-27-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB