Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 18:50

General

  • Target

    db01783710e0c5aff92156a0e76deade_JaffaCakes118.exe

  • Size

    112KB

  • MD5

    db01783710e0c5aff92156a0e76deade

  • SHA1

    f90167c2424970fb586bdecd4c5eb7738b885f31

  • SHA256

    237b74d3fd84f91aba3e541a34dd92c02b3625e61bf7ee0c01e691dd56004e15

  • SHA512

    86417d98b58b2fc9820ba84a4daf749d3ac05bded84310170c97fd43c1952c679394165e28b62a9984fc673c58a06da99350341ce11d9ffc2e080987944bc835

  • SSDEEP

    1536:GLet+Nn/JQvDDdq7RnGU59ol1yNHuH4iKEFXvxKqHs:GLu+N/m3dmnG6ozyhuH/Xey

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db01783710e0c5aff92156a0e76deade_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db01783710e0c5aff92156a0e76deade_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3028
    • \??\c:\tmp\DaumCleans.exe
      "c:\tmp\DaumCleans.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2640
    • C:\Users\Admin\AppData\Local\Temp\db01783710e0c5aff92156a0e76deade_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\db01783710e0c5aff92156a0e76deade_JaffaCakes118.exe"
      2⤵
        PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \tmp\DaumCleans.exe

      Filesize

      37KB

      MD5

      8c7f0d2bca870f1b100e790d1023dc98

      SHA1

      73d1085d569852892fbfa310f5c8fa9c2a421c37

      SHA256

      08ae8c74a72f5ff6b7507f652e654009e89924fafab8d46ffa39d6d7b6b03f94

      SHA512

      c86e74aa3f16ca5458a566f19bc74db0dfc4823b70a3a311f8f8b54faa1fc9c9f3bcc17fc820c1bbd130ad2a5fc84f62b29f94dea334b9d28fc008cb1a73417f

    • memory/2620-11-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2640-10-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/3028-3-0x00000000021A0000-0x00000000021B7000-memory.dmp

      Filesize

      92KB

    • memory/3028-8-0x0000000002260000-0x0000000002277000-memory.dmp

      Filesize

      92KB

    • memory/3028-12-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/3028-13-0x0000000002260000-0x000000000226D000-memory.dmp

      Filesize

      52KB