Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 05:44

General

  • Target

    d9b93d8fbca0e75f07e4771b333cd0ce_JaffaCakes118.exe

  • Size

    226KB

  • MD5

    d9b93d8fbca0e75f07e4771b333cd0ce

  • SHA1

    408b60fadf26bf702b924b98d35ae45d7d9b3d73

  • SHA256

    b307aa2994e0f2acfd0356cd3550c34707f2c886fd9e8405f7b3eb38c472761c

  • SHA512

    b0f9efaace502988e278d7d56bceb3dff63ede0f5e634111fcd0540f77885938764ea2d7fffb295c8bb661723ec82622e62b3769d98523ad7557209e8b37534c

  • SSDEEP

    3072:VpVxYDSf7jZbCsImZthQWPlRjsDkI/d49/vVS04ijG9oaPoM0QJGk87iq:VpVT5pUWPlRjsIn9lS7kooaPASGqq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9b93d8fbca0e75f07e4771b333cd0ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9b93d8fbca0e75f07e4771b333cd0ce_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\Esahia.exe
      C:\Windows\Esahia.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:5104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Esahia.exe

    Filesize

    226KB

    MD5

    d9b93d8fbca0e75f07e4771b333cd0ce

    SHA1

    408b60fadf26bf702b924b98d35ae45d7d9b3d73

    SHA256

    b307aa2994e0f2acfd0356cd3550c34707f2c886fd9e8405f7b3eb38c472761c

    SHA512

    b0f9efaace502988e278d7d56bceb3dff63ede0f5e634111fcd0540f77885938764ea2d7fffb295c8bb661723ec82622e62b3769d98523ad7557209e8b37534c

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    390B

    MD5

    d46ece6843052fb84466f1ac76dc8fd6

    SHA1

    cd31d2c57f156200f8048146a1c31d1726ea83d9

    SHA256

    72a9169032f2fa1fbe383d50d9d396fa7ebf3d8ccf32d02bb2873d974cf7c56d

    SHA512

    d1eda202a436cac83a6550b98dc11b4a7e8ae9743b3c814f49d735075d08d06c9cb63d916c9e742644b3ffa74ee2b2ec2fd844e890a48a5a4af0f6a38ebd893c

  • memory/376-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/376-2-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/376-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/376-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/376-15-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-10-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-12-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-13-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-11-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-31520-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-31410-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-56424-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-50238-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-116738-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-116740-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-116741-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-116743-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/5104-116747-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB