Analysis

  • max time kernel
    135s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 21:05

General

  • Target

    c7a676e984bf992c01ad18fb6ed7b289_JaffaCakes118.exe

  • Size

    3.5MB

  • MD5

    c7a676e984bf992c01ad18fb6ed7b289

  • SHA1

    af59d490c8247d0bcc6892d424318f2e787ef73f

  • SHA256

    f63c4e0a8946c15ba8d8343c0265cc483ffe9cdb0e62a996a1f995e57e4f9f52

  • SHA512

    c33032037698151ced330ba55c0a449d7b492bed8d853a457a01c746c12404e2b416ba3c737d9f2875d187b2e158ea45eb84c9d1d79a8a76e666934581713c12

  • SSDEEP

    49152:0a1ISQus8/2Ge/5mMk1HvWpcnscVyCDxl4KZKWCbquSVex1yrZO70r:/1ISQusLGKmMaHgcn+gxPKWCbMs1Gt

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7a676e984bf992c01ad18fb6ed7b289_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c7a676e984bf992c01ad18fb6ed7b289_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Documents and Settings\tazebama.dl_
      "C:\Documents and Settings\tazebama.dl_"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 724
        3⤵
        • Program crash
        PID:4644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4912 -ip 4912
    1⤵
      PID:960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\tazebama.dl_

      Filesize

      157KB

      MD5

      4c5406f905ce7f5662a2b698188ee56a

      SHA1

      3409d80da034c3efa426692f7ee7d7b7f7c06955

      SHA256

      5bce523ac1ba8f94ef2a7f13409b3b5962eddaf9d5a4778b9f6f5e7829dd11a6

      SHA512

      06ea515c45e5400bb064c0b1cd4899abe3dcdeca5e8d4755287daab8a0e2374f5bad53d6e6ae0eeb57c691620e01e4e541e7cff3c25274a465c40ef17db2d336

    • C:\Users\tazebama.dll

      Filesize

      32KB

      MD5

      b6a03576e595afacb37ada2f1d5a0529

      SHA1

      d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8

      SHA256

      1707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad

      SHA512

      181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c

    • C:\autorun.inf

      Filesize

      126B

      MD5

      163e20cbccefcdd42f46e43a94173c46

      SHA1

      4c7b5048e8608e2a75799e00ecf1bbb4773279ae

      SHA256

      7780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e

      SHA512

      e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8

    • C:\zPharaoh.exe

      Filesize

      158KB

      MD5

      edf5802ee3156db318d4123a950daa59

      SHA1

      f4ca6a18e111020ad0aaddf8f098288864683f21

      SHA256

      cba18ce72137daca92717e0a1c9f5f6fd2115144657a4de1f09439c033e07053

      SHA512

      2d8ab3d6d7d977c5cf7a205c8bb7f9e1de010008d18c579ffe56260fad0815a47117571b8ff6976604af3aada7aa62bc15d0d3bb191aa0c8b0293049b05758aa

    • F:\zPharaoh.exe

      Filesize

      157KB

      MD5

      570d97b9fe706d15a2ef9c0f5e2cbb99

      SHA1

      efb3ca3c6134e9afc1cc62cd6368b6f11f05e2bc

      SHA256

      a017ffbca9f04af8ca25517c0808674d52e7fb749ef53d18ff41d03911f435b5

      SHA512

      13940e193e8eeab0ab9f511f12f2990dbd9ba960f6361b466fd10e862f6b9d26eb157f4febe9448f17ae04dbb93391ff0891b43f8bf86ee96c9609b4e3861fb9

    • memory/936-0-0x0000000001000000-0x000000000136B000-memory.dmp

      Filesize

      3.4MB

    • memory/936-8-0x000000000115E000-0x000000000116A000-memory.dmp

      Filesize

      48KB

    • memory/936-40-0x0000000001000000-0x000000000136B000-memory.dmp

      Filesize

      3.4MB

    • memory/936-41-0x0000000001000000-0x000000000136B000-memory.dmp

      Filesize

      3.4MB

    • memory/4912-10-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/4912-39-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB