Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 07:42

General

  • Target

    c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe

  • Size

    3.3MB

  • MD5

    c043a91bee18df1a8eac8f093adc194d

  • SHA1

    977a9c687850fc25ee1fa314481e572c7e316f9c

  • SHA256

    5a8bde02380b3a20e9340161499db1bd078ac10230652d45eeba441769f433dc

  • SHA512

    3917ab8215eb1dd0d25a556e26daeed7715e136bd0a02a8924b7360e0d558b0777ced062daf7ab8b10a26fabb234f87d574e4d773e16a894f4911908be57acce

  • SSDEEP

    49152:fHqPbvurw/c2UcF9O6hPn7UWN5f6hHryW6BHvJGo5qynybGkMz3Yu+md9YzZcn:fKPTsw09SdPAWN56hf695zyV3md9Yz6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\hp10.tmp\insthp.exe
      C:\Users\Admin\AppData\Local\Temp\hp10.tmp\insthp.exe C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\LIVRETEC.CT1

    Filesize

    33KB

    MD5

    cfb22cf2f1d1bc13624da5595e8bc9be

    SHA1

    d138910b4be09e9fbd8c76cc6596a41141973807

    SHA256

    c4ee6e4a1b6da202b3fb08ad8190e2f8fea20a72471f2bd140631541d9797aa3

    SHA512

    6d923897c65d0ba9e864a74a5994a34a36ab57bf85f954db3c7a9c1a8d2cf6961eb889002042d2c454298106aea53a884699f8ddf43db713335fc06632b5e7d2

  • C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\LIVRETEC.CT2

    Filesize

    33KB

    MD5

    e1de4237c142a93ea12116d15af10999

    SHA1

    2c0ccf3b6aa6695cc49e68f40a428f5b54d2ede3

    SHA256

    188ac36db22b6dbbbcf735c75631d8415e99051ce09b3965234205f24a3c8295

    SHA512

    e2a13286a6d4bcdd5020b86099bf8ccf2af074be81b11a9acd8d31628d910d9b839431109dbf3f8161f61ca5dcf42bcd3d602a7a3b4a2e4e7d5f715d2ca0c55b

  • C:\Users\Admin\AppData\Local\Temp\___hptmp\Instala.hp

    Filesize

    15KB

    MD5

    1cc1a533c46171ac37e9e1445a5bb6c2

    SHA1

    6011b53d8207c78b511a736174ff66b32e6d01ec

    SHA256

    3c942bd91e9dc2347eb04a3f8aaa0dbc63d73cc60b1fbb515b61ee08a81392ff

    SHA512

    6bc882839742526d9d3d4e3541ee05e988fb9ae881354686b7226f25836289137e11e2f7afd1df8bd53666c5e5f93ebbc14ec5e33a02d11b94a22cc7e913baf0

  • C:\Users\Admin\AppData\Local\Temp\___hptmp\instala.cab

    Filesize

    813KB

    MD5

    afcd02c6ae68b3ac23acbbcffcdc9334

    SHA1

    63428608241948f428d691b040fd2a613a92020a

    SHA256

    742d20c839300e9349f91d46425b99c4471feec2c72d4c86f487ce31ab1456b1

    SHA512

    6c92da35f98e34dd720736e0204741f88135f0391edf18cdaa9b8e4249e1d3c4b882c71f8de2500803e294358205e62f0b917559bfd0011e838182fd0d2ff7fb

  • C:\Users\Admin\AppData\Local\Temp\hp10.tmp

    Filesize

    3.4MB

    MD5

    c6ebdb6e9613925f9dd2916da209f467

    SHA1

    48c21f495364e82aeb896074fc8955a4e2fdb9c9

    SHA256

    b793d664fdeb832ee566c635f3643e62269675de778cb2c86a36e5e35135cb2a

    SHA512

    582fa3baef28a857c852aa0d7736cc25525107de6fff506bc0c72331309c7e8ad409d887e5d875f798c084fa6794d9820a4a4e6ed43a25ddbd10adf98e3f35c0

  • C:\Users\Admin\AppData\Local\Temp\hp10.tmp\Instalar.DEF

    Filesize

    1KB

    MD5

    2dafe71a348178731778459d7d846d30

    SHA1

    b32d6a29caf4dd0f7cc6c88e6c7b69e3889a2557

    SHA256

    3ee7c0f607de3e636bffcd81c54a493a9f4d912317868b83a1416e7c31e1c291

    SHA512

    426c72c30c0b7d18e60a8064d4a4ad0a2358ae1fab43697b4ec6596282bd6867ebd85d8abe9f7ae1526818800d91fdb551a9c037c63decdc217b06ad11442b8a

  • C:\Users\Admin\AppData\Local\Temp\hp10.tmp\cabin32.dll

    Filesize

    48KB

    MD5

    dd4fe0e657a06933d1a68a5773699e56

    SHA1

    9e9f3f3deb113c7a1ad04aa670612c20b7f4f0d1

    SHA256

    fc6d89413046e7277ff0104ee71c6ab28ab5001de2151d38cea7ab753309ed88

    SHA512

    9b81cabf7b79c1051203c627d5d2b08ab9c811eccd6adb6774a17e1344281f43fbee51c984492f79c353a59649c3db37094cb615c3699a9a3e6ba52a8a228ee2

  • C:\Users\Admin\AppData\Local\Temp\hp10.tmp\hp32v360.dll

    Filesize

    172KB

    MD5

    e35fce2e7552cf2f5e2ec75a1566da8c

    SHA1

    485d24d900f76abafd3ef98ae7621b87b4c0aa8f

    SHA256

    2a4163cc2e8ffae7a0371adeedad772da32c7bb3b0a239814b1e056a82a21f7d

    SHA512

    3b5d3fbc0cb3cc21f4a9c1985138c2133eff68fe02b0dca19c498028d0814fe62066fdb3ba4a7498c8cfa3d1c85aa0a77d85a4f9e1b6fa4b00fdfdac5e25850d

  • C:\Users\Admin\AppData\Local\Temp\hp10.tmp\inst01.bmp

    Filesize

    16KB

    MD5

    2547567bb40351f371210b0e308e9965

    SHA1

    4f2f231184d81b68c089426a7494e974cbef2fa7

    SHA256

    9b4e417b0c6658b96bff90de1034595374190edd6d6aab72f84d941368637b5a

    SHA512

    b6a7e52464a406c3e3465f01be6d4d1e6f9c87b4dc65cf5b61d3f9da6154975504b37612938fb440c8d8059f235beb3ba1d68779fffb8875b67fe37122061a2b

  • C:\Users\Admin\AppData\Local\Temp\hp10.tmp\insthp.exe

    Filesize

    851KB

    MD5

    7fcf04b976326e46271522d643221565

    SHA1

    616bf5355d615c7ff5a2c4bd81fff5d48f4d75bb

    SHA256

    3aef122511cbdf0cb82529b6e378916dd4bbd2a88fc1f617bd40b68e969969f0

    SHA512

    d31c3b8fe11bd83928c47c8b8d651c44873534265d0f0dfb844742427b4828edccf8ad7e0ff5a721a6e81010a8ce354a130c0540bf583bc63d108f627b572089

  • C:\Users\Admin\AppData\Local\Temp\hp11.tmp

    Filesize

    943KB

    MD5

    4a80119167f3fb650d908b5ed9d71344

    SHA1

    e641e4a6bf9365a2c5883a3cf5ebddfbe2b6fe13

    SHA256

    279e2a988ba15a09a57c8b61bc134d00e38c09355ae978b065c275717886b252

    SHA512

    0ae8fc555ee1d869fa5dd6d003dc5169d9519210d7c669696cbb0ebe7053ce83d17310635383e892191a68b97c8e221fe5c7284318e512fa9f5ba39a54260fb0

  • memory/2328-79-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2980-72-0x00000000007B0000-0x00000000007BF000-memory.dmp

    Filesize

    60KB

  • memory/2980-68-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/2980-67-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/2980-77-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2980-78-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/2980-66-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2980-82-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/2980-81-0x00000000007B0000-0x00000000007BF000-memory.dmp

    Filesize

    60KB