Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 07:36

General

  • Target

    d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe

  • Size

    390KB

  • MD5

    d9e31199d6e4f88e49372fa4236e2ccc

  • SHA1

    8d5dbe7183ff57ff6d53be40c410c05bac059ffe

  • SHA256

    5c956afac33f0d1574d5b19e4c55787d4d4ff3200c7b434a4196e992c92579bc

  • SHA512

    0a7af75d6c97c8fed18e7ada577e2ecb0af9e4d8a9d3f9be3267c2fb19ecd3ee0f08f69fcc2cda3e16e675d41db4e0c095c90e55c17b522da3abfabc86aedfd4

  • SSDEEP

    6144:U8xqv19iuS4vCmX5TnCWOcw65g0VSys/iNnQiAyMt9/etMhQ5I1x4VrNFItl:+N9i/46M5TtOkgwmQQimVQqejm7

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\WINDOWS\svchost.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s svchost.reg
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:3068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\svchost.reg

          Filesize

          133B

          MD5

          46828f24430ece92015c4df745f81128

          SHA1

          9a6eeff598129bb79a7978915d671680926000ee

          SHA256

          c57d73dbcfd8da31961145b1da9eeaf9aa66fec3b5ca5dfdd99408d193056aaf

          SHA512

          366dfad8ef7e6ae8fbee9a3bb9f6ea16911f363a1064e548202f5e4c90548926911e20351727f4b885505b90db3cee95ebb6b7a29d71f9c1e2483b1fcbc198b8

        • C:\Windows\svchost.bat

          Filesize

          721B

          MD5

          0e4e4dc2a8d527e23f4688190970c96a

          SHA1

          88ae07ac7f1b98c6e34ee5edd841b97c4f79be2a

          SHA256

          faab8d63e3c20d19e80f7ebb8260cbae906ed84ac2596c46039d96df33c3e5c5

          SHA512

          bfa73107e13ca0f22015a56a9ca31f4727b5a145dccd9f96b3e92da828dcef2b9c07b2a1322ee27d852f624dc44df71387761c5a8954c7676295878004f79d26

        • memory/2364-0-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2364-19-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/2364-20-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB