Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 05:10

General

  • Target

    c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    c259036fc6f89e4b4a110c2305084928

  • SHA1

    10180f8fc2d987ea0c2e469e396202fcc2c4af18

  • SHA256

    bfb40b894295244cd6c55a8b79c33a191914ce1044612d2a54d7368ba2726a60

  • SHA512

    d5cc70bf08d9a7f4f5f204dc9840b6bfb5f055bb28ddcc27b48a9cf477240450531c57c70543348eb8a1d83e46bd20a49d91b85c23f7e938bedfda89a249119d

  • SSDEEP

    3072:NAjJdxQJwUfkOBsofaO+PXjFD2EaeM0XOrzHuQ6iK/ipWD7bjHUZ32:KJdxhSBsRnpMes3OQ6iIiWTUk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\hg.exe
      "C:\Windows\hg.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 124
        3⤵
        • Program crash
        PID:2696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\hg.exe

          Filesize

          171KB

          MD5

          e50666be8b9295eed85298a7e6c43ae1

          SHA1

          f81130a96aeae3aeb3d7b1fc4fce4c093dbfd266

          SHA256

          d23e1cbc33dd14beb186277ee66541261ecef98334fb63251ff1a15d7c60a8a3

          SHA512

          f5ee6628055ad90ec522343257796d37dd861950df779130332a091a176e94e3267589a868fc4c26ee98212524dadb77ad00ce7d8eb4750c8f65f1c3fb810a15

        • memory/2736-10-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/2736-11-0x0000000000220000-0x00000000002A0000-memory.dmp

          Filesize

          512KB

        • memory/2736-12-0x0000000000220000-0x00000000002A0000-memory.dmp

          Filesize

          512KB

        • memory/2736-15-0x0000000000220000-0x00000000002A0000-memory.dmp

          Filesize

          512KB

        • memory/2736-14-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/2772-0-0x0000000000400000-0x0000000000432200-memory.dmp

          Filesize

          200KB

        • memory/2772-8-0x0000000002A90000-0x0000000002AF3000-memory.dmp

          Filesize

          396KB

        • memory/2772-9-0x0000000002A90000-0x0000000002AF3000-memory.dmp

          Filesize

          396KB

        • memory/2772-13-0x0000000000400000-0x0000000000432200-memory.dmp

          Filesize

          200KB

        • memory/2772-28-0x0000000002A90000-0x0000000002AF3000-memory.dmp

          Filesize

          396KB