Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 09:24

General

  • Target

    c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe

  • Size

    562KB

  • MD5

    c06edd9c928d267ac9df727443f55448

  • SHA1

    96e14aa66d4ea3ddd27784b82d2440ed8e2e5f8d

  • SHA256

    a476c6569d6ab92310804d5d1ac6524189d2249d33d0949a0571148730a23cc6

  • SHA512

    22f19d07ac4b071432ce4b63f625f2dcc934c8c7966923f67c6ed14185fd1fc246558f13b77d215a7874d7196cd32344fd8ff04bb6540ffb82fea5cc7b576d8a

  • SSDEEP

    12288:PJM46GJC0PJ9NDkqOMtV5RMEKmSakp8nsQR6i7ijJmz:1LBn/V5RMEK1JQki73z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Roaming\Spoolv.exe
      C:\Users\Admin\AppData\Roaming\Spoolv.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2128
    • C:\Users\Admin\AppData\Roaming\Spoolv.exe
      C:\Users\Admin\AppData\Roaming\Spoolv.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Spoolv.exe

          Filesize

          1KB

          MD5

          3d9bb6f53646c6a96df819bdb471796a

          SHA1

          46d2d340398594f5060373f81232b82211e32825

          SHA256

          c0657322afdac0df459f3bc233ecf362838774a116ff8d82846914925d246e83

          SHA512

          b6165a7be23878cf75a70745d87767041f5a413c2f27d51440974ef205e09e10789cdc540bb504cd4cb4b857ae7d16e935fce85f1a618dde8b1f44471b661873

        • memory/1668-0-0x0000000074411000-0x0000000074412000-memory.dmp

          Filesize

          4KB

        • memory/1668-2-0x0000000074410000-0x00000000749BB000-memory.dmp

          Filesize

          5.7MB

        • memory/1668-5-0x0000000074410000-0x00000000749BB000-memory.dmp

          Filesize

          5.7MB

        • memory/1668-24-0x0000000074410000-0x00000000749BB000-memory.dmp

          Filesize

          5.7MB

        • memory/1772-23-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/1772-21-0x0000000000600000-0x00000000006ED000-memory.dmp

          Filesize

          948KB

        • memory/2128-14-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2128-16-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2128-10-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB