Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 05:48

General

  • Target

    cecfe71c33d7512942839f451ccef76a_JaffaCakes118.exe

  • Size

    309KB

  • MD5

    cecfe71c33d7512942839f451ccef76a

  • SHA1

    fef8d233b1851efee835dfd4bd1af897b4f24782

  • SHA256

    5911060128967ed179ca41dccf77e1657801b2931616acd96ecb597c5bfbec73

  • SHA512

    0104e8615ce53a2725c2e614dd97993e2cc142c9fe3ad3f12aa3fa717118822adca5816c846f7a81ba2d7d41f2a4ba25d1f8e2257147d422c1784307aff81522

  • SSDEEP

    6144:iKmWsiH8DYgM3a+gpeg4poameNTMbYE/GyAKRgj:iKEiH80giwa2ba7KRg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cecfe71c33d7512942839f451ccef76a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cecfe71c33d7512942839f451ccef76a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\cecfe71c33d7512942839f451ccef76a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\cecfe71c33d7512942839f451ccef76a_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bassmod.dll

    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • memory/1260-25-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-17-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/1260-27-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-31-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-29-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-18-0x0000000000400000-0x00000000004DE7C9-memory.dmp

    Filesize

    889KB

  • memory/1260-21-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-20-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-23-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-0-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/1260-8-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-4-0x0000000000400000-0x00000000004DE7C9-memory.dmp

    Filesize

    889KB

  • memory/1260-10-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1260-33-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-35-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-37-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-39-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-41-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-43-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-45-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1260-47-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB