Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 15:19

General

  • Target

    d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    d695a6e0731a75bf9a667617b54a2f77

  • SHA1

    2e5c4e13322dfebae47f76906cb6d39bbf6ffd13

  • SHA256

    525f7b195f51dec7029300289eaaf4c6d93a1badfb55c3af8ee92d013dd6dc4b

  • SHA512

    4ff889393fb568ba1e48732d567f89440bb91ddbf0722cbef7291377644434fe48e3224c6b9da86062ecb18d7222281e3751d18924694cfaf7df89aea41ef584

  • SSDEEP

    384:0edQZBSx4hO2fCRHDXEutzk0cSnCpacoqj771KZx5jI0/JGO+AxTr6+I9PfYUDr0:Pd6xnC9DUSzkPSCVzrx0/JGOJxqLoI4T

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\support338945a0.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe Darkbomb.dll FunctionStart
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D695A6~1.EXE >> NUL
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Darkbomb.dll

    Filesize

    36KB

    MD5

    7de66c5ded87e8c7e46b1bc9ee2c5db2

    SHA1

    ea9db0f6c616732e88b60e2339dea25ae3b4d109

    SHA256

    5318c5930266539909563b14eec3b9a4ab8996bbdae808a94b51261546aeebf5

    SHA512

    4c56dc2501244cd2b562aef18344fca823a72ac92e2619d8ead0a6714b159fdc14125018c63072c12a956c0501eef9b4e51563e4f4f01768805950b32aa31c9f

  • C:\support338945a0.bat

    Filesize

    39B

    MD5

    d6ad254c75599ac9ceb317d261cfe354

    SHA1

    f9c9bae9bdba0ea9d3c486e13cb554ec9b010909

    SHA256

    3142a7859b079df4a8fd3daf7a9d0057dd2c18ca302c69a6f9526ee543c9a655

    SHA512

    b05820cab51f66b5b8213359f0a0ddde125e3eab5fdfd196393dc805fc02fd9e72bdb1704cc0718131fc55a8b3d7cd7e54f53fa8140a187b508c443f6d85b473

  • memory/2648-0-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB

  • memory/2648-17-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB