Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2024 04:26

General

  • Target

    cc38e3ac1ca97aefdaf92643c1dc68f3_JaffaCakes118.exe

  • Size

    414KB

  • MD5

    cc38e3ac1ca97aefdaf92643c1dc68f3

  • SHA1

    3f80d544c9e3b789db490a13c86dc5cd61682bc2

  • SHA256

    22542d1aef8c0987be0f91b90e4f70f372cc1b16ed67bbb1582798cac732f538

  • SHA512

    04c876e75e495e1dad18c06d669c2965feaa25d454fa54dc754091effc67c4704a78c10a53185b0cdb4e2cc3b5ca9ab6854632205539e6853dbd84e1b4f79235

  • SSDEEP

    6144:w31JnqbGb0cd0yGdXeEW58hp9b5vwMVO5UWoU8F0:w3Hqb3meXe0loWkUl

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc38e3ac1ca97aefdaf92643c1dc68f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cc38e3ac1ca97aefdaf92643c1dc68f3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\cc38e3ac1ca97aefdaf92643c1dc68f3_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\kemelsystmgr.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\kemelsystmgr.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Local\kemelsystmgr.exe
        "C:\Users\Admin\AppData\Local\kemelsystmgr.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\AppData\Local\kemelsystmgr.exe
          "C:\Users\Admin\AppData\Local\kemelsystmgr.exe"
          4⤵
            PID:1864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\kemelsystmgr.exe

      Filesize

      414KB

      MD5

      cc38e3ac1ca97aefdaf92643c1dc68f3

      SHA1

      3f80d544c9e3b789db490a13c86dc5cd61682bc2

      SHA256

      22542d1aef8c0987be0f91b90e4f70f372cc1b16ed67bbb1582798cac732f538

      SHA512

      04c876e75e495e1dad18c06d669c2965feaa25d454fa54dc754091effc67c4704a78c10a53185b0cdb4e2cc3b5ca9ab6854632205539e6853dbd84e1b4f79235

    • memory/1864-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1864-19-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1864-16-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2416-4-0x000000007437E000-0x000000007437F000-memory.dmp

      Filesize

      4KB

    • memory/2416-5-0x0000000074370000-0x0000000074A5E000-memory.dmp

      Filesize

      6.9MB

    • memory/2416-8-0x0000000074370000-0x0000000074A5E000-memory.dmp

      Filesize

      6.9MB

    • memory/2416-0-0x000000007437E000-0x000000007437F000-memory.dmp

      Filesize

      4KB

    • memory/2416-3-0x0000000074370000-0x0000000074A5E000-memory.dmp

      Filesize

      6.9MB

    • memory/2416-2-0x0000000000420000-0x000000000043A000-memory.dmp

      Filesize

      104KB

    • memory/2416-1-0x0000000001000000-0x000000000106E000-memory.dmp

      Filesize

      440KB

    • memory/2904-12-0x00000000010D0000-0x000000000113E000-memory.dmp

      Filesize

      440KB

    • memory/2904-13-0x0000000074320000-0x0000000074A0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2904-14-0x0000000074320000-0x0000000074A0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2904-15-0x0000000074320000-0x0000000074A0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2904-21-0x0000000074320000-0x0000000074A0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2904-22-0x0000000074320000-0x0000000074A0E000-memory.dmp

      Filesize

      6.9MB