Analysis

  • max time kernel
    30s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 13:59

General

  • Target

    c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    c0e4dd20e4649bf7796d5a06ec562041

  • SHA1

    8a4ba77abbb08ec80933fb43b0db726b06409fd3

  • SHA256

    8d73abb2f43b7f34791afe772a51812c6b88de095bb1da872593453001d32c0b

  • SHA512

    c8c2f7f1932a4f36e28d360e8aee45d3d2ea4f1f8d20640120c676bbe0e802bf19ef48ebad0e6bdc17c8b6897cf557813fb12e43099f38a0e19d7f6e76cf73e0

  • SSDEEP

    384:vGm8Ynsn4CVEHjPc4AKVcOZNXjKUW1XLqg/FZrD6d9:em8Ys4/bc4A0cOZN+UW1XTFZrD6b

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\42AB.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\42AB.tmp.bat

    Filesize

    207B

    MD5

    44b6b86df8542bac1047eed392ae119b

    SHA1

    fabaf64a37911118358903b56cf12d2bc348b0d9

    SHA256

    8e6cf69baf773b13f3dc88d6c67af9c3a6c8c851530c7eb623d68a23a60bf25b

    SHA512

    8d76f0c4b1a75c66b431a3fd8d45b7bf86161467ae0ae3cf6e83dfc5335ce42154484d2d50815ce4f145cbd108614db15d57fcbd7de620681240313549d31765

  • C:\Windows\SysWOW64\dispexcb.tmp

    Filesize

    800KB

    MD5

    7b6def46901d2675ba8642954dcfb5e5

    SHA1

    626da7e9f631ea5f3ab19d23ab8126a4b9632330

    SHA256

    45d9b27e3d6ce8e0569f67635cf8635fd89350865b1a0f71396c2ee25f175d3c

    SHA512

    0c37b062fb6cab7a6b5ed42e15f8bfdf32e0b79dc05f84ef38ef90c58e8200b80fd8e6151afe7ac12d49fd9d78762be1e415b7549790e1fd940129483e4f57a3

  • memory/1080-16-0x0000000020000000-0x000000002006C000-memory.dmp

    Filesize

    432KB

  • memory/1080-25-0x0000000020000000-0x000000002006C000-memory.dmp

    Filesize

    432KB