Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 14:57

General

  • Target

    d232de18a894964d856bc500e0385cf6_JaffaCakes118.exe

  • Size

    743KB

  • MD5

    d232de18a894964d856bc500e0385cf6

  • SHA1

    73544af3bfba885c9ab6045a9b7ab98b7542012d

  • SHA256

    35c4637b3834651018d2f2c55320eb3a5abe59dfd05425905eae7aab1a927d4e

  • SHA512

    764ce6a41d1b9c1b78a208083b3ffcb0f479525c89532031e47dff1a15edea311b2a94b83cd5976eb83ec83a21ba58c1a9ea578dbf92d1683f30f6b04338b82d

  • SSDEEP

    12288:oJy8S+2U4u/n/80dW5A0zy26JwQ5oAlK+GXnv5TIkAbQQ52LYRg08y5rfRki:gBEU4ufxdW5A2sJr/khnvZIkA33D

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d232de18a894964d856bc500e0385cf6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d232de18a894964d856bc500e0385cf6_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.BAT
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2652
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      743KB

      MD5

      d232de18a894964d856bc500e0385cf6

      SHA1

      73544af3bfba885c9ab6045a9b7ab98b7542012d

      SHA256

      35c4637b3834651018d2f2c55320eb3a5abe59dfd05425905eae7aab1a927d4e

      SHA512

      764ce6a41d1b9c1b78a208083b3ffcb0f479525c89532031e47dff1a15edea311b2a94b83cd5976eb83ec83a21ba58c1a9ea578dbf92d1683f30f6b04338b82d

    • C:\Windows\uninstal.BAT

      Filesize

      218B

      MD5

      20831b8b7259db8df3b16759f298e0c1

      SHA1

      83bec10ff9b66c5e53b1444bf99f61644fc9594c

      SHA256

      b813777da47f1a80135f77a0a589e723631c64c92a2a26788be448fe402f6ab9

      SHA512

      ea25194ccbc0c351b1c3812f585ee95eb67348b8cf14f2dad8ffc20c39ab723143db26889dced6889be42adb570b8766d1ec0e0a1df0e0586d9793d38e709770

    • memory/2068-0-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2068-13-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2760-4-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2760-16-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2760-15-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB