Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 23:07

General

  • Target

    db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    db6363ea2b3d2de121a8eb26578fcf66

  • SHA1

    62882f40f78706630bd5f96c51e1f43e96be1fee

  • SHA256

    7c493c7ab436958e109b9dfcd169e0893b08b61067693f351c159b4ea7db98f2

  • SHA512

    b53cd90b9af69f5aff39268091d4f9d2289e75575128e9e2d61795e85036547f2aa3fca7c24eca3c914ea76b0e9da6ff62c11692569a72049e470923c4adaa35

  • SSDEEP

    768:K3HMAHUSkgn95wGXhl2zNblNVb+rO7+XW9fSO1i5CSzn+XQp3Y:dM/n95flg53VsXW9v9PQp3Y

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\microsoft shared\MSInfo\11EFC04C.dat

    Filesize

    32KB

    MD5

    db6363ea2b3d2de121a8eb26578fcf66

    SHA1

    62882f40f78706630bd5f96c51e1f43e96be1fee

    SHA256

    7c493c7ab436958e109b9dfcd169e0893b08b61067693f351c159b4ea7db98f2

    SHA512

    b53cd90b9af69f5aff39268091d4f9d2289e75575128e9e2d61795e85036547f2aa3fca7c24eca3c914ea76b0e9da6ff62c11692569a72049e470923c4adaa35

  • C:\Program Files\Common Files\microsoft shared\MSInfo\11EFC04C.dll

    Filesize

    45KB

    MD5

    d2b072b87378bced6c3fdbe6c0c2cde4

    SHA1

    9b0bbe47f1c3aa70ecb6b828fb68f4910a2756f1

    SHA256

    6b0b4d40ec372aeba81a019a17c01911fab1c5ecc7ad8f01fbbbc54da5411dd2

    SHA512

    4ff6ba593f5c945c274a7815942ee8a5ad042b05b850638b27858d2ab5cee124a9302cba8914026befa2f773f91a7d5daad0d6562e101b9c8ab93af0c8ffb86f

  • memory/5012-24-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-26-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-15-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-17-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-16-0x0000000000780000-0x0000000000790000-memory.dmp

    Filesize

    64KB

  • memory/5012-18-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-20-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-22-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-12-0x0000000000780000-0x0000000000790000-memory.dmp

    Filesize

    64KB

  • memory/5012-28-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-30-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-32-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-34-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-36-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-38-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-40-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/5012-42-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB