Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 11:45

General

  • Target

    cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe

  • Size

    745KB

  • MD5

    cf7381b0254759e359bf34c3aa78a4cf

  • SHA1

    07f2f2e6ddf2478baf9f9ce672218731f8ed8c87

  • SHA256

    682370b6fd7fc9000864bc453d39c575fdaec4ec5be06bd36f505494e3212159

  • SHA512

    fe6b3d1a803e1643226f79b552a91cf83bb09ae1ffacdd60272828d15734195353ef586cd64b91b6e0151702a2609f13b64ba16b1800260cf030ce3552c883fe

  • SSDEEP

    12288:5cjVR9//E2TZ6jmDwvdn0vzH/OolwEMzMSAYpGZz0svFnd:aVR9//pFJs0vr/OoGa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\61642520.BAT
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2784
  • C:\Windows\qq.exe
    C:\Windows\qq.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\61642520.BAT

      Filesize

      218B

      MD5

      8b5fd4ada0876c5eafd2c123593562fe

      SHA1

      8eae8fe17e1ed60e363009b1b3750c812003ba66

      SHA256

      68066854482e0db75fed2d227aa5b310a6942b2d02b713a9329f13a68e5e8a59

      SHA512

      5ebb0950752e0b7e6e61e41b5793367aa5ff3b3dcb2a124ccd1d18d0958444ca70b5487a3769588a68dec7c77bec4545e3d417845a7015d8ab4a6b3a85cea147

    • C:\Windows\qq.exe

      Filesize

      745KB

      MD5

      cf7381b0254759e359bf34c3aa78a4cf

      SHA1

      07f2f2e6ddf2478baf9f9ce672218731f8ed8c87

      SHA256

      682370b6fd7fc9000864bc453d39c575fdaec4ec5be06bd36f505494e3212159

      SHA512

      fe6b3d1a803e1643226f79b552a91cf83bb09ae1ffacdd60272828d15734195353ef586cd64b91b6e0151702a2609f13b64ba16b1800260cf030ce3552c883fe

    • memory/2224-0-0x0000000000400000-0x00000000004C4200-memory.dmp

      Filesize

      784KB

    • memory/2224-1-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2224-16-0x0000000000400000-0x00000000004C4200-memory.dmp

      Filesize

      784KB

    • memory/2660-5-0x0000000000400000-0x00000000004C4200-memory.dmp

      Filesize

      784KB

    • memory/2660-6-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2660-18-0x0000000000400000-0x00000000004C4200-memory.dmp

      Filesize

      784KB

    • memory/2660-20-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB