Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 16:50

General

  • Target

    d000ac261677ebb7263d0ea396c68202_JaffaCakes118.exe

  • Size

    63KB

  • MD5

    d000ac261677ebb7263d0ea396c68202

  • SHA1

    99fb6d25d05313e76ad6774409f117a5f5076d58

  • SHA256

    4038455a9e9bd570723b07d7dcb651a68a20a8ab2ee33da678502e8751c0ce6b

  • SHA512

    b5a0c3a8c9f9c63367ea4000f3d69c040dfe03e82cfaf59265e9036fe20d714a6a1eec00e8e0578cb5b434eade4d41ed76b1412cefa824c1736b288b655aeaa2

  • SSDEEP

    768:JUOcqHNW38mzs/LyFfAZcXkSKVW/aZrFDmJz4KsJFuxGo22d10d1CWRfAvPjzdyB:WOcH384ciX96DmJ4Kys2PqBPHWciaBg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d000ac261677ebb7263d0ea396c68202_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d000ac261677ebb7263d0ea396c68202_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Dcp..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Dcp..bat

          Filesize

          238B

          MD5

          2b6b6163f92da46a4fca929122c2b5da

          SHA1

          35e2bee5fe9b07622da65e4b837da4ec78f57b61

          SHA256

          0ed28e65f080f23d35f7e35d5d6df286155f9b9f46aa33dd4894a8e4d6410732

          SHA512

          e626e4780fe7bcb64433a112b35af61058254849bd87ebbe634f78ec016d2d88aa8c6adbf1d6d314df1f6a88761241fe5c0e38ffc9c79b927e57b72dd6ad9775

        • memory/2100-0-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2100-3-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2100-2-0x0000000000360000-0x000000000037B000-memory.dmp

          Filesize

          108KB

        • memory/2100-5-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2100-4-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2100-8-0x0000000074940000-0x000000007494F000-memory.dmp

          Filesize

          60KB

        • memory/2100-7-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB