Analysis

  • max time kernel
    91s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 12:36

General

  • Target

    d1f29b64e7f063a86cf57d46fa3099f7_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    d1f29b64e7f063a86cf57d46fa3099f7

  • SHA1

    f7e22865ef535d75f12834a2e4af5eb2d89bd317

  • SHA256

    75d96a85a6f9b3654fc8d8b4a49a5393d6980f77d2431f9a31e73da570d5fbed

  • SHA512

    86692987d1d2580707b7b7cd210f88c3f4389ace03fa7475b612952f899a489eb30a557f35b62a470b04b6f6dd80fdec360c4d0ed17e3bb48a178fa2ad9d7238

  • SSDEEP

    768:Um28YtLlknuI06voJsyFy4SeqFHbV97uu++iliMVzXDInfHci+CNJm:Um28mLmne5J3FXp83h++GpV3GfHV+/

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1f29b64e7f063a86cf57d46fa3099f7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1f29b64e7f063a86cf57d46fa3099f7_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3116
  • C:\Windows\SysWOW64\85E3B3E0.EXE
    C:\Windows\SysWOW64\85E3B3E0.EXE -a
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\85E3B3E0.EXE

    Filesize

    32KB

    MD5

    d1f29b64e7f063a86cf57d46fa3099f7

    SHA1

    f7e22865ef535d75f12834a2e4af5eb2d89bd317

    SHA256

    75d96a85a6f9b3654fc8d8b4a49a5393d6980f77d2431f9a31e73da570d5fbed

    SHA512

    86692987d1d2580707b7b7cd210f88c3f4389ace03fa7475b612952f899a489eb30a557f35b62a470b04b6f6dd80fdec360c4d0ed17e3bb48a178fa2ad9d7238

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    233B

    MD5

    7682e31167d2b3acba8a5e77ba972c05

    SHA1

    d8f51b0bb47605ab690fbefd7488dfb1de4acc60

    SHA256

    80eb38243934202f1395d1c50904fc9d2faaf3497e751e066221fca9d554331d

    SHA512

    321b5f4b0b93e850cf419421552786955794287fcb1aa8eb68c14c89934683948eb193f0398a008efcb02bda34ae76aa1d198ee943754a5d422258a492ced2c0

  • memory/1976-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/1976-1-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1976-8-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3628-10-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB