Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 15:15

General

  • Target

    c91461d5d48ffca9280ac0bda9c4c74f_JaffaCakes118.exe

  • Size

    783KB

  • MD5

    c91461d5d48ffca9280ac0bda9c4c74f

  • SHA1

    50b6dd6de241db0c27f098309b40c9a5ab069ac8

  • SHA256

    f87310cfedcd338f21ad048a3c960688149f16f7dc00d36076a7c54736315a9b

  • SHA512

    edbe59c7fad3c188bf6d49c5593d94fdfe81d0032faeec5e8d7e782c44c008ad4de389cbe97eddb95ae533c289e46c9ee8481c98bc9c78e76800f651a049d6d7

  • SSDEEP

    24576:1eTxq1PI+5obBddL77h/qp2uSsDpyOrHaTAen1VP:1e8DobBr77h/qp2uppymHaAenTP

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c91461d5d48ffca9280ac0bda9c4c74f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c91461d5d48ffca9280ac0bda9c4c74f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\6b960fe1\setup.exe
      "C:\Users\Admin\AppData\Local\Temp/6b960fe1/setup.exe" ProfileFileName=step0.ini
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6b960fe1\installer\boot.dat

    Filesize

    1KB

    MD5

    82ff009dd3236db90393cead19bd2b16

    SHA1

    3b9eab7281a500960d6598316db7b8299970d8ba

    SHA256

    0f1d6e066ebc9ed29cc2f194fad5091431a57eb85e13fdd19d1c8881c9402e71

    SHA512

    47bc6609654812719030e470f949b2af139346937cb689d078de731d57278f2743da5a1cf2dd71bbadb47251be7e5b784c429ba2769559e2d4dcddc978fbe8f1

  • C:\Users\Admin\AppData\Local\Temp\6b960fe1\installer\step0.ini

    Filesize

    24KB

    MD5

    209c2246be67511d4bcb1140e66279ae

    SHA1

    7c22e25b569ddaf0baa7897850d64b1ea55def8a

    SHA256

    7a41025e2e7032373df1423a02fd1e9a71e328c0b97a44d799d8e82412b3d579

    SHA512

    50d96e16fa99d2126706ea9dd1f1ae81640fd2d8b9e032607ecea237b07dbfe7b84b682ad8c450637545ebf86306133d0c4e64dc94591cc7e5275bf5f4defd31

  • C:\Users\Admin\AppData\Local\Temp\6b960fe1\setup.exe

    Filesize

    1.4MB

    MD5

    c3bc99a2f410a5bede595c6a35aabc44

    SHA1

    cf513259f468b9b15d1749dbe60d215c0b76098c

    SHA256

    747193c4bdfed0a0d9dc2cd79e9682787169467c90e89d165026ccc220142cd6

    SHA512

    ddc3eee00d14947fc7cab3ff870328e9046c62357ef1a0ba809ec846a404e3797a1bead5c85ba393ef2536589ea69293da3eefa57e1e99f33b60912c1f1908b3

  • memory/5052-16-0x0000000001670000-0x0000000001671000-memory.dmp

    Filesize

    4KB

  • memory/5052-19-0x0000000001670000-0x0000000001671000-memory.dmp

    Filesize

    4KB