Analysis

  • max time kernel
    78s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 18:23

General

  • Target

    d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    d02ebcddf4b219d0b19d780f2006d92a

  • SHA1

    d81e9704c45d7899711ef5bd346748bf1bb28256

  • SHA256

    1d8f7331e7f515f348707bf8d2fe9edb223bdfe1700a47cc0a1732a5291c9990

  • SHA512

    eea07f3adff8d8d1e4498f4e54114efea47713a6088d648be014cb3b1ff50cc061f2648f535a1c75b8ceb8e9eb8b7a553e52bfa065cfe40cd354c1394717f491

  • SSDEEP

    24576:Mv1yyMWlFTZY+TPnGB1dpHYvEwMisGvRrq2ajiswTP+25iP7N0:EAyMWl/jOLdKMwMiR8Rji/+VN0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\~
      C:\Users\Admin\AppData\Local\Temp\~
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        MSIEXEC.EXE /i "http://download.realtimegaming.com/cdn/slotsplus/Slots Plus Casino20100803112731.msi" DDC_DID=1034588 DDC_RTGURL=http://216.93.176.186/dl/TrackSetup/TrackSetup.aspx?DID=1034588%26filename=SlotsPlus%2Eexe SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="~"
        3⤵
        • Use of msiexec (install) with remote resource
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4824

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\{B8AEE261-C060-4BD1-A48D-5258DF37914E}\0x0409.ini

          Filesize

          20KB

          MD5

          36affbd6ff77d1515cfc1c5e998fbaf9

          SHA1

          950d00ecc2e7fd2c48897814029e8eedf6397838

          SHA256

          fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3

          SHA512

          2f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808

        • C:\Users\Admin\AppData\Local\Temp\{B8AEE261-C060-4BD1-A48D-5258DF37914E}\_ISMSIDEL.INI

          Filesize

          20B

          MD5

          db9af7503f195df96593ac42d5519075

          SHA1

          1b487531bad10f77750b8a50aca48593379e5f56

          SHA256

          0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

          SHA512

          6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

        • C:\Users\Admin\AppData\Local\Temp\~

          Filesize

          904KB

          MD5

          31343b4530d32463ec51a4e89f9145b6

          SHA1

          16df0f4e8f50b3036629f2497b3aefba21a0c839

          SHA256

          6d3a97f2610a6a550c0dd038bcf5fd91c8e82131e0671decc54ebdec51a47147

          SHA512

          d89bd47cfa338aa3bf7584fb208b2ce650f2e33881b64da07b449ea2206841447b247a3bab7387ddf351fc3d3e5595f09dfbb041f1e23ecdeb5cf859e78096e2

        • C:\Users\Admin\AppData\Local\Temp\~D6F9.tmp

          Filesize

          5KB

          MD5

          ee98cfef6a2592bc6552e1fa64eabd75

          SHA1

          2b95913216543fb774a48f8a871c0cf19bced24f

          SHA256

          2052822d6d6791e4e479e397e98e25bb146d8f8b08b94e31deb547a29e5fda92

          SHA512

          018f77dd6328a466d7110d284c31768ee26a3fe982a3b11df513aa76b3b9fc64459e86b11073a3374be17aa77bb013d1981a811396b1e8a604104e092d8ba0d2

        • memory/2484-32-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB

        • memory/2484-52-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB