Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 20:11

General

  • Target

    bf5137a8691cf5d59d4d0359648ef90d_JaffaCakes118.exe

  • Size

    269KB

  • MD5

    bf5137a8691cf5d59d4d0359648ef90d

  • SHA1

    7c13db66a92798f1412c8bf599a116e9cf0797c6

  • SHA256

    b945453f44671ddd85464d4d6831879eb0fab2fc5cc270d48fc7546aa012cd81

  • SHA512

    2296c1e53ae29d2ce72d0a971cb6ecd465cc4ac6b15db30e59167f247c951febbf986581604d253991d50ad9f9f262ea963ed95e81bd85e40dfa95c4264ab7d2

  • SSDEEP

    6144:bAiU9siB9LdRGEjXfO5T1ERn+Q6JqZgDiCP9tbsXkJn2IoS:bAHLXG4PO5TaR+QnZgDi7XIoS

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf5137a8691cf5d59d4d0359648ef90d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bf5137a8691cf5d59d4d0359648ef90d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\kGWsF.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaupdatre" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\javaapp.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2804
    • C:\Users\Admin\AppData\Roaming\javaapp.exe
      "C:\Users\Admin\AppData\Roaming\javaapp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Users\Admin\AppData\Roaming\javaapp.exe
        C:\Users\Admin\AppData\Roaming\javaapp.exe
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kGWsF.bat

    Filesize

    138B

    MD5

    436c51f33bd506ec8ffe22b5f70195eb

    SHA1

    6e2bbcdc65460c8e581523d3a2392e9e0d3ec975

    SHA256

    9963fbe891cd9d5ed860cdf65d1b427854465821cba2e498b58fd370c1989688

    SHA512

    e73efb5922cebf85631b00276a4a5a4d1fae31eae30fe94efce15474b6e9520aab3298739aca4bbf0f3c2391929cf5b6fd8b48624eee3d32f99b5a031bc45f3b

  • C:\Users\Admin\AppData\Roaming\javaapp.exe

    Filesize

    269KB

    MD5

    bf5137a8691cf5d59d4d0359648ef90d

    SHA1

    7c13db66a92798f1412c8bf599a116e9cf0797c6

    SHA256

    b945453f44671ddd85464d4d6831879eb0fab2fc5cc270d48fc7546aa012cd81

    SHA512

    2296c1e53ae29d2ce72d0a971cb6ecd465cc4ac6b15db30e59167f247c951febbf986581604d253991d50ad9f9f262ea963ed95e81bd85e40dfa95c4264ab7d2

  • memory/2400-39-0x0000000003430000-0x00000000036B7000-memory.dmp

    Filesize

    2.5MB

  • memory/2400-38-0x0000000000400000-0x0000000000687000-memory.dmp

    Filesize

    2.5MB

  • memory/2400-35-0x0000000003930000-0x0000000003BB7000-memory.dmp

    Filesize

    2.5MB

  • memory/2400-34-0x0000000003430000-0x00000000036B7000-memory.dmp

    Filesize

    2.5MB

  • memory/2400-1-0x0000000000400000-0x0000000000687000-memory.dmp

    Filesize

    2.5MB

  • memory/2812-42-0x0000000000400000-0x0000000000687000-memory.dmp

    Filesize

    2.5MB

  • memory/2812-56-0x0000000000400000-0x0000000000687000-memory.dmp

    Filesize

    2.5MB

  • memory/2944-48-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2944-45-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2944-50-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2944-57-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2944-58-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB