Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 08:02

General

  • Target

    d5eac3d2d24a1aa9cb9c876d4aa81ca7_JaffaCakes118.exe

  • Size

    722KB

  • MD5

    d5eac3d2d24a1aa9cb9c876d4aa81ca7

  • SHA1

    6494cba6d623653f2b90d7b441ab8dff54f7e3c1

  • SHA256

    271ad21eb35119175a6e78a11fc2a81970c6a1f72e8facb4b8f48fed5b1efde0

  • SHA512

    446081fd3752ba67b4090a3679ca218b4d59185afec663f01ef85e73d2219131d40be294b1efe220f4b0892d177cc30c79fe38a48e6ea868569b0e2e841286e6

  • SSDEEP

    12288:eWnq35ZWsZENBd0OvPsKlOZgYVrclDqdF3Z4mxxqDqVTVOC1:ez3WBzd0UkKl/4QmXxVTz1

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5eac3d2d24a1aa9cb9c876d4aa81ca7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5eac3d2d24a1aa9cb9c876d4aa81ca7_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2772
  • C:\Windows\1314.exe
    C:\Windows\1314.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

      Filesize

      347KB

      MD5

      3b75c4e7f428289e63f6ac4fc1a2275c

      SHA1

      a7066207ed94938fdee9c383ed6f189999e5041c

      SHA256

      4c807b2375a2e38e031139922214420fb2d416209324785a52b39d8b6d45c7bf

      SHA512

      30d7ecfef7d0adae9cc3af41b2530d2ffea5483ce4751455c79c3a3ee809c87e2ec12394b59769911274a187c48bbc3f91d275aff8ef84446ce7f7e93383b9ac

    • memory/412-80-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/2772-77-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/2812-0-0x0000000001000000-0x0000000001121000-memory.dmp

      Filesize

      1.1MB

    • memory/2812-1-0x0000000000600000-0x0000000000654000-memory.dmp

      Filesize

      336KB

    • memory/2812-53-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-56-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-55-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-54-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-52-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-51-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-50-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-49-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-48-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-47-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-46-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-45-0x0000000000D80000-0x0000000000D81000-memory.dmp

      Filesize

      4KB

    • memory/2812-44-0x0000000000D20000-0x0000000000D21000-memory.dmp

      Filesize

      4KB

    • memory/2812-57-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-43-0x0000000000D30000-0x0000000000D31000-memory.dmp

      Filesize

      4KB

    • memory/2812-42-0x0000000000D50000-0x0000000000D51000-memory.dmp

      Filesize

      4KB

    • memory/2812-41-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/2812-40-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-39-0x0000000000C90000-0x0000000000C91000-memory.dmp

      Filesize

      4KB

    • memory/2812-38-0x0000000000D00000-0x0000000000D01000-memory.dmp

      Filesize

      4KB

    • memory/2812-37-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

      Filesize

      4KB

    • memory/2812-36-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

      Filesize

      4KB

    • memory/2812-35-0x0000000000C70000-0x0000000000C71000-memory.dmp

      Filesize

      4KB

    • memory/2812-34-0x0000000000C80000-0x0000000000C81000-memory.dmp

      Filesize

      4KB

    • memory/2812-33-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

      Filesize

      4KB

    • memory/2812-32-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

      Filesize

      4KB

    • memory/2812-61-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-63-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-62-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-60-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-59-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-58-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-31-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

      Filesize

      4KB

    • memory/2812-30-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-29-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-28-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-27-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-26-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-25-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-24-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-23-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-22-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-21-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-20-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-19-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-18-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-17-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-16-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-15-0x0000000000C50000-0x0000000000C51000-memory.dmp

      Filesize

      4KB

    • memory/2812-14-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-13-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-12-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-11-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-10-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-9-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-8-0x0000000000790000-0x0000000000791000-memory.dmp

      Filesize

      4KB

    • memory/2812-7-0x00000000007A0000-0x00000000007A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-6-0x00000000005B0000-0x00000000005B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-5-0x00000000005C0000-0x00000000005C1000-memory.dmp

      Filesize

      4KB

    • memory/2812-4-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/2812-3-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/2812-2-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/2812-71-0x0000000001000000-0x0000000001121000-memory.dmp

      Filesize

      1.1MB

    • memory/2812-74-0x0000000000600000-0x0000000000654000-memory.dmp

      Filesize

      336KB

    • memory/2812-75-0x00000000031B0000-0x00000000031B1000-memory.dmp

      Filesize

      4KB

    • memory/2812-76-0x00000000031A0000-0x00000000031A1000-memory.dmp

      Filesize

      4KB

    • memory/2812-79-0x0000000001000000-0x0000000001121000-memory.dmp

      Filesize

      1.1MB