Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 05:45

General

  • Target

    c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe

  • Size

    47KB

  • MD5

    c26413866339f9fa5481ca81d69d2786

  • SHA1

    f626bd14616244e27039b4fce3a37c07595a34e4

  • SHA256

    74e09a7cc98c2138aa2c158f0877865c2928d5e37322c7444eb65eeb6967dc59

  • SHA512

    443e3da037890c11ee8d7d6ac449ac1b9a86e0bc9b54d8b77d00bae39c8c1abc717c0f88389b39d34b26449a1ec6a1dd6e862eb3ee3e3623c335aebd66e88964

  • SSDEEP

    384:dw0cbAUsKi3Bbh5vD91g/6e9JdYiTQH18eAHU6smAAcnZKh4lcW:i0HB3FHvvxe/dYpH187HEZA3y

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\Rundll32.exe
      Rundll32.exe C:\Windows\system32\mszdltsg.dll,w
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2360
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\259433812.BAT" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\259433812.BAT

    Filesize

    226B

    MD5

    6177977a311b6b47cd2536e1a16f0411

    SHA1

    53ae6da2d05fea7afb35e154af397cc66de39c7f

    SHA256

    02c928eb6f7708f119c98d483e0aa1b4c52a471b6d70321f0aaa47780947f565

    SHA512

    391d62368321aef4fea0f95fe96428b11740e12ccc9154705b4a45c535c90a69b4e046994fb406d808b9265bdae1d842cc45fc2ef58491ffd687d1873aa58cc7

  • C:\Windows\SysWOW64\mszdltsg.dll

    Filesize

    36KB

    MD5

    fb31db7fbd72008bc900a6b3d34c8398

    SHA1

    10dd102022bb02d93050e19327029e6d450e64b6

    SHA256

    9f9e53bf1fbc5e4d4a874a498e961fc1f56be84b4931542e296d0ada479f038c

    SHA512

    50909bf95b434c6572b740a0f333b28d12b9e6bd753866251fcbe087a8fbf2f71445831515ca048340302109547f22d562cc59dc3b605b79407ae1611cea9eb2

  • memory/2120-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2120-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB