Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 09:56

General

  • Target

    d417cbb10f18a204772a2f030ff4b227_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    d417cbb10f18a204772a2f030ff4b227

  • SHA1

    31d10088c236c93384c02964e83a9ea8c953e95c

  • SHA256

    afd851d285397b9192307d3a3e8464513329d3b944c57ce35f2a32d841bfc807

  • SHA512

    29423cfede336ce96ad9e961325db524733ec8974e0d357ef53a9c24aea1e35044720e6b6cd9d80963c49c00e6f0dfd6de3a05e4141eb6abf5a007b3e4711101

  • SSDEEP

    768:3kaN0MeFo8GcC/fdHOYQqvuue2vGjsypxhyE95KSZ8gvh0:EFoMCHVLN2POUpxhyEDKmy

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d417cbb10f18a204772a2f030ff4b227_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d417cbb10f18a204772a2f030ff4b227_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\win1ogon.exe
      C:\Windows\system32\win1ogon.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3012
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Deledomn.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Deledomn.bat

    Filesize

    212B

    MD5

    58157aa6d464c7e72eeff9a5dd67a35c

    SHA1

    f3e2d8e216dd7508daf43379da6da05f196465df

    SHA256

    c31bf9e36b98f612c2a8820968c3559db8996663d0dfba81e56654fc1c29733c

    SHA512

    84cfbd34e59231c94ad014f5bf6e4a4d750a5868a8463aa5b605aee0c85cfcef08223f03fc138f9ce7e07e75e40ba6ece25db4ddc8255bde2cde0dc36dc57b39

  • \Windows\SysWOW64\win1ogon.exe

    Filesize

    46KB

    MD5

    d417cbb10f18a204772a2f030ff4b227

    SHA1

    31d10088c236c93384c02964e83a9ea8c953e95c

    SHA256

    afd851d285397b9192307d3a3e8464513329d3b944c57ce35f2a32d841bfc807

    SHA512

    29423cfede336ce96ad9e961325db524733ec8974e0d357ef53a9c24aea1e35044720e6b6cd9d80963c49c00e6f0dfd6de3a05e4141eb6abf5a007b3e4711101

  • memory/2196-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2196-5-0x00000000004B0000-0x00000000004C5000-memory.dmp

    Filesize

    84KB

  • memory/2196-10-0x00000000004B0000-0x00000000004C5000-memory.dmp

    Filesize

    84KB

  • memory/2196-24-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3012-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3012-16-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB