Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 00:42

General

  • Target

    db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    db83044597e2b12bd8cf9a12d4870cce

  • SHA1

    ead58ccb73af8b47bcdce50eb43525d3d5aea65e

  • SHA256

    9b3acae6a6738003aa758af3e6a7c17164fb8f97b83df395a06d74e642db6992

  • SHA512

    f61071eee3c48ac15769f8f850cb7eddf0dc47b9ca4a281cdc0af81b72bc5190099d01b126145d1a1ed0e5c7e3b33878d0a81b1d038372e44fa356db281cd8ea

  • SSDEEP

    24576:uUZVeIOWJRH814FaLwNAQUQjC05y37G9vH9XimKJY85iMUEIs7YuPCp7Bb/W/+lU:uUZgduRutLwOcjCD36f9XimKJYGtTap4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe

      Filesize

      31KB

      MD5

      7efc387017221960ae741fb41186c3ed

      SHA1

      9e7ee2862559f0387b5995fce5a2c9819b9cdecf

      SHA256

      1dcbf21d4b5195c84e8776ef179c9d74c7f2f55fef3300ca841b634a722e3ede

      SHA512

      31845d75fb72514f59c637138af45d1adc6e7b1f5a02ecb86aa8c8d94f0c5cc47ccf1fd54522aa3e9d0293415a581252c394ce17d44b3044a5480f12af01e0ed

    • memory/1388-25-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1388-21-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1936-18-0x0000000000020000-0x0000000000029000-memory.dmp

      Filesize

      36KB

    • memory/1936-34-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/1936-24-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/1936-15-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/2840-4-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/2840-19-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/2840-20-0x0000000001001000-0x0000000001003000-memory.dmp

      Filesize

      8KB

    • memory/2840-9-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2840-0-0x0000000001001000-0x0000000001003000-memory.dmp

      Filesize

      8KB

    • memory/2840-3-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/2840-1-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/2840-35-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB