Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 17:59

General

  • Target

    c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe

  • Size

    85KB

  • MD5

    c1455f76ba619bc0dcdb9bf0fcb62640

  • SHA1

    dace71d0072c62982602f988763713451be15530

  • SHA256

    958bcbcea8d6da363fa6af2c1483087c3a16e95369b7107f073de0ccc981009d

  • SHA512

    7d8c0a9124386323cc41585c1dab75951ea844be97aa8d4934569c6c59ea927e2d07ed23eebb71c66b7b86a4f7f948b144b43d35480cddd9c7a28dfc3eb49067

  • SSDEEP

    1536:RUeHiWRgkkjH8nyWmJjukOfgKTynmtWUzH7DnA3VqiY1h+rY0u0vwxUM8Y:Rd/vyWmJjuv9mmtWkDnYVah+r3u0YxEY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\UYRD4E\keygen.exe
      C:\Users\Admin\AppData\Local\Temp\UYRD4E\keygen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2372
    • C:\Users\Admin\AppData\Local\Temp\UYRD4E\smss.exe
      "C:\Users\Admin\AppData\Local\Temp\UYRD4E\smss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 260
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\UYRD4E\keygen.exe

    Filesize

    8KB

    MD5

    764816b0853f4bc76d92878e04490632

    SHA1

    bfc2997c3a61a8abb53091669ff853d511dcea0f

    SHA256

    d6d2c70ceac9723149acae43eb288e25080a46d9f5880cde35f94b8d55d27723

    SHA512

    b5cff3105b4602129445e5100d71cb04ee04bcca916966cbcc06ed059a8da20db31c4671ef93af7a526de50a0da8edb1fdae3441f148cbc9f78c449b812c0c2b

  • \Users\Admin\AppData\Local\Temp\UYRD4E\smss.exe

    Filesize

    31KB

    MD5

    3c552c8ce83792c261511288cbe45990

    SHA1

    06d6dc3eb66cfc85f053a7e91472067b4e1ebc29

    SHA256

    b0c3bc431a6f3b363ae17d1569901cd4c0e28c940835d520762e2cce76b1f702

    SHA512

    d230e9c8aadc1587970c75a2925236b9b153bfc49e16eca4b047447093430fbf48a76dae801c1c7866b9e8d46ed5f8c95ec74a6883cc6bc078d8f338d57613f3

  • \Users\Admin\AppData\Local\Temp\nstB1A5.tmp\DcryptDll.dll

    Filesize

    14KB

    MD5

    904beebec2790ee2ca0c90fc448ac7e0

    SHA1

    40fabf1eb0a3b7168351c4514c5288216cb1566d

    SHA256

    f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222

    SHA512

    8bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa

  • memory/2092-32-0x00000000001E0000-0x00000000001E7000-memory.dmp

    Filesize

    28KB

  • memory/2092-37-0x00000000001E0000-0x00000000001E7000-memory.dmp

    Filesize

    28KB

  • memory/2372-36-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB