Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 01:27

General

  • Target

    d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe

  • Size

    281KB

  • MD5

    d0cbd7f9826b4460d2e0e240b3b6eff5

  • SHA1

    3adb6f56ab378bf58f07d6712ea2487a40dc3c49

  • SHA256

    3edc656cf12a4825e02ebee70c3e1af7d6d75b1f80d92951c9f79a92f0db4ac0

  • SHA512

    27e29d357b76b26f01ccebf27850a0fec8c6231fd8f5c1165d0db2a28e82bce828557b8f1b0b14adf17245e0276355da4ae2e4e65d96a6633e93770c82bd5cb6

  • SSDEEP

    6144:aBj6B6kQu1WTminflPN80PxpkJP9sF2GtxvEvCO0P+:p6k+Tmin80PPesFFxMvJ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2276
  • C:\Windows\svchest.exe
    C:\Windows\svchest.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\svchest.exe

      Filesize

      281KB

      MD5

      d0cbd7f9826b4460d2e0e240b3b6eff5

      SHA1

      3adb6f56ab378bf58f07d6712ea2487a40dc3c49

      SHA256

      3edc656cf12a4825e02ebee70c3e1af7d6d75b1f80d92951c9f79a92f0db4ac0

      SHA512

      27e29d357b76b26f01ccebf27850a0fec8c6231fd8f5c1165d0db2a28e82bce828557b8f1b0b14adf17245e0276355da4ae2e4e65d96a6633e93770c82bd5cb6

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      529a30ebd5d49f942870054a3ed5e926

      SHA1

      d5d222b66b63deefde424482eb36f8d9f5cce350

      SHA256

      09e0beff6a84993443e233633cfa9f77e956470070545b855101f4fe4d3aebd6

      SHA512

      2ac6a8b2d370e42d7774688c4215a4a34877979cf443546696c2065b05feda795c1bfbcbe2b07c59b3e35ac6fa2ad4815bfefcbad434130834266f6c6e40bf09

    • memory/1724-18-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/1724-3-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/1724-2-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/1724-0-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/1724-1-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/2172-7-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/2172-8-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/2172-9-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2172-20-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/2172-21-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2172-23-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB