Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 16:07

General

  • Target

    cfed6d08d6825e93edb3f034847cc8a8_JaffaCakes118.exe

  • Size

    5.8MB

  • MD5

    cfed6d08d6825e93edb3f034847cc8a8

  • SHA1

    ba6c496d59fb8c601a2c660557b3df1047ce832e

  • SHA256

    6467f7d7a07731c14914a6bb2c108206a62887995df648cdaf633d135658d19b

  • SHA512

    ca4489f222b6673701e47e60eb4d5d3bd80c627aac0c1fe331f48bb1bb4bc705daf32ad99f5fe6aaac80d91f7e459daa4bf427ce85e7d3cbc8a7b44770e87126

  • SSDEEP

    98304:ZdRnOUm+tQxVXfGnPK6nMrsqRP0HSHYPFNb9BmjIwm0SX8wZRcDFI9R52klRba95:rkl+VnPf0eHS2ZKVmH84cDFk9ba9TTpH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfed6d08d6825e93edb3f034847cc8a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfed6d08d6825e93edb3f034847cc8a8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\Stp9C6E_TMP.EXE
      "C:\Users\Admin\AppData\Local\Temp\Stp9C6E_TMP.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Users\Admin\AppData\Local\Temp\is-26FQH.tmp\is-6OU6T.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-26FQH.tmp\is-6OU6T.tmp" /SL4 $5001C "C:\Users\Admin\AppData\Local\Temp\Stp9C6E_TMP.EXE" 5741488 52224
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-26FQH.tmp\is-6OU6T.tmp

    Filesize

    647KB

    MD5

    b683339ce008e97a0243a0f83bca1e09

    SHA1

    a8a4c078225ec9d94912762bda3a745d83dbe8f4

    SHA256

    5c6b8a1ab73cd03140040a3093e0d8466c666cd3fe17e8660dbc1a30d0b6f925

    SHA512

    c39b2501f5887c363633c94b04d58396a0d285ff65963ed513e99ff2dd7f36da323904278c6a64b9f1f637aaeed17e3d9d40540baa9805369cc664a32c62c780

  • \Users\Admin\AppData\Local\Temp\Stp9C6E_TMP.EXE

    Filesize

    5.7MB

    MD5

    c5966ce32e71283dd5a8a739a4bb32a4

    SHA1

    c0ec61771a179b9823911533a220b2efb2ea528f

    SHA256

    817f3023fe7507c425d40ae29d6ce0373f07f697f3e644af80cc019dc25c6965

    SHA512

    cb8652cd800766b38d384d02ffd3215399b234ad52005b1da9e193d0e0df49254574f52e77f055f34976aa0d7acd15b146ee2726118a085561dafaa6c8f384cc

  • \Users\Admin\AppData\Local\Temp\is-GICU9.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1848-5-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1848-7-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/1848-21-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2408-22-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB