Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 02:29

General

  • Target

    dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe

  • Size

    384KB

  • MD5

    dba73d9c46468248ce2b68fd6728105b

  • SHA1

    d36fe7fc292be06a246c388a88794e7b506aa6d2

  • SHA256

    ea268087d17a39c87f41ca023fbcd14e44373c4158eaec9e5d755ebb9cf0171e

  • SHA512

    843a9246bf16c1eb8621ddba50921b6b4aaf95c799632db2edf6b53172521e66c4d3d3458ff5abfd9db5a5cd3ff6251897292bc8d1d4e56032f2bfc146c096da

  • SSDEEP

    6144:y1Ej8iDF2wvJF4s2Jm3H8AXqMxI3DnbBkxjiv03ZOPEzzb2Y2dec:Bjj7MJGMDnbatNO8zzbmec

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c .\stsf1.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
          dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4852
          • C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
            C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2436
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c .\stsf1.bat
              6⤵
              • System Location Discovery: System Language Discovery
              PID:892
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c .\stsf.bat
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c .\stsf.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\stsf.bat

    Filesize

    217B

    MD5

    07425730c227db6340ad62dd7f1072ff

    SHA1

    a624b7f61d317666e6d22ccfce0b73d28c3a6c73

    SHA256

    9b1179386a91f26967b9a6d12ef76c58a251edc352ea421d5c023bdfe03db358

    SHA512

    fde605a4eb48bf5e1d446cb0c879d8ec20f9f1cfe3b8fd2251cd9583c6de49230286182419509cd97344072f9ef8d59a5297e3c7c8b5e55c2ddb8be1b083d04e

  • C:\Users\Admin\AppData\Local\Temp\stsf1.bat

    Filesize

    178B

    MD5

    42f7d131b1ae5c69d2d6e1730995cabf

    SHA1

    8d2bacd8f56646a8de77c52c6e03b35032f337bb

    SHA256

    ef16b01e6462c9f9f546f74f8397a0419afbcc8fb8e2b147b456b7e9156284c2

    SHA512

    8d8a3110847b01945817935c0b55e842f141898c38e405bc358acceb6630acdddacd744b917cd24c4e60253fa2df58690c2d1d0c11e7d492215046993d26c130

  • C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe

    Filesize

    384KB

    MD5

    dba73d9c46468248ce2b68fd6728105b

    SHA1

    d36fe7fc292be06a246c388a88794e7b506aa6d2

    SHA256

    ea268087d17a39c87f41ca023fbcd14e44373c4158eaec9e5d755ebb9cf0171e

    SHA512

    843a9246bf16c1eb8621ddba50921b6b4aaf95c799632db2edf6b53172521e66c4d3d3458ff5abfd9db5a5cd3ff6251897292bc8d1d4e56032f2bfc146c096da

  • memory/2436-27-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2436-28-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2436-29-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2436-34-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-5-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-7-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-6-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-8-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-2-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-19-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4308-4-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB