Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 10:01

General

  • Target

    d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    d1ac4071d870ccaa573a59581b215cef

  • SHA1

    fa0b0dd20850dc596559cdee4943ca05f95b8609

  • SHA256

    a4bf8f557dde1577fdc9f45ec6490525fedfde75ec3318e9398e221fab00adad

  • SHA512

    d57a68fae0175a96fc2101f986bc6f09335f18312755a627a962ff153ba6f9b3d73863262f46815b0dbe70e0f865ee247610fd01840706c8b938902d731327c6

  • SSDEEP

    384:bjxPJFhd3o6dm1w/v3qNrciy6kpvLN4YiIYdeyt7lL3Ht84B:phFTo6P/f556ghXyt5L3X

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\13EE.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\13EE.tmp.bat

          Filesize

          207B

          MD5

          5d4d605b28bde681fba05d4f3db23c69

          SHA1

          11ec3df7cb6a7e4e7fa14eeb08c72ad9ea217049

          SHA256

          d6674244b208e598d8c5014b439ea407fd2b23a8d8aee65217cee4c3379b7555

          SHA512

          f9a92efb3c275a599367cd6887129fcf475a365b70df6a945c3202ad03f7d8530a03a472ffc3fe05d72a3a1d1a7d34527c40405554093cfbab0255c07773daef

        • C:\Windows\SysWOW64\nwapi32dj.nls

          Filesize

          428B

          MD5

          8a0cdcc50012ef4838142a07b7264322

          SHA1

          e5a68e996d5640228869a43ab17e95f222ba8444

          SHA256

          4cb7fea0e70faf0502c006057b5b5ece0ac3192b787939dbbd2837855fc8a5be

          SHA512

          0a3e099a69edf19ad0a265c64fd8dd6904d7e0b667f8c6c448e7f3f09f251133eacdcd7812abe4e6550f154c9eebb96a29351a630d2fbf88d6432e59fa83aa58

        • C:\Windows\SysWOW64\nwapi32dj.tmp

          Filesize

          2.2MB

          MD5

          921fe693d1cb6b26061dd5d2ab72a562

          SHA1

          c8d0db1b566884064813e0d5056b568095edafb3

          SHA256

          daf72b6c0c1ec13444d0fa12c0d334b81d00487db64803302d699420656b356b

          SHA512

          16a63a938e7a533672a5a5b170724a4060da07e5e3275b98c7e1c23db34cb7acdb1f79631fcfd0e5638de2d279cdadabb629df6a6d8a269ec8fbf11818d4b1c8

        • memory/2400-16-0x0000000010000000-0x0000000010009000-memory.dmp

          Filesize

          36KB

        • memory/2400-25-0x0000000010000000-0x0000000010009000-memory.dmp

          Filesize

          36KB