Analysis

  • max time kernel
    97s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 13:07

General

  • Target

    dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    dc554d6343a952e5f269ab6fe983447d

  • SHA1

    fa765406fe4e041de54f9414936875151c1f35f7

  • SHA256

    6fe72dc7e0a3ec67205bf8ec520724bd99411d0c1122d6fb1ae94706a162d0cd

  • SHA512

    b997ad381856897d7e31a82c3a781a20307c998ae66cc38cee30999c3460173175f13107fe9304fbfe2b1d9122ca522a41b07f55fd423b88780cdc058992c0fa

  • SSDEEP

    6144:7vbx8gUHPq+m6d002UoNlGxSSrJGUOcUURynzqiIKpe:7dUHyj6WjblASeBOyRynt0

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe
        "C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3340
        • C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe
          "C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /i:2788
            5⤵
              PID:1628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe

      Filesize

      356KB

      MD5

      dc554d6343a952e5f269ab6fe983447d

      SHA1

      fa765406fe4e041de54f9414936875151c1f35f7

      SHA256

      6fe72dc7e0a3ec67205bf8ec520724bd99411d0c1122d6fb1ae94706a162d0cd

      SHA512

      b997ad381856897d7e31a82c3a781a20307c998ae66cc38cee30999c3460173175f13107fe9304fbfe2b1d9122ca522a41b07f55fd423b88780cdc058992c0fa

    • C:\ProgramData\yGeJbAr47\RCX8B96.tmp

      Filesize

      356KB

      MD5

      110da21bc3d159a50503a81c26dd8730

      SHA1

      0ab6a45656a3f282f30c3d692c8d2010a854d9a4

      SHA256

      5353973f6a622e24f47ac0827e607a3e2e1df8d86ba76f7f4fc57d0abb86540e

      SHA512

      d185997eab001443fac03d69e1d89da208daf80ffd7f3ab7effb50a496f9f76ffaa339c22600765cc7209323e59fad2967ddb931831889dbc1e7dd292907b77a

    • memory/1820-18-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1820-1-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1820-3-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1820-2-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1820-21-0x0000000075F60000-0x0000000076050000-memory.dmp

      Filesize

      960KB

    • memory/1820-4-0x0000000075F60000-0x0000000076050000-memory.dmp

      Filesize

      960KB

    • memory/2788-29-0x0000000075F60000-0x0000000076050000-memory.dmp

      Filesize

      960KB

    • memory/2788-37-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2788-39-0x0000000075F60000-0x0000000076050000-memory.dmp

      Filesize

      960KB

    • memory/3208-5-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB

    • memory/3208-0-0x0000000075F80000-0x0000000075F81000-memory.dmp

      Filesize

      4KB

    • memory/3340-22-0x0000000075F60000-0x0000000076050000-memory.dmp

      Filesize

      960KB

    • memory/3340-28-0x0000000075F60000-0x0000000076050000-memory.dmp

      Filesize

      960KB

    • memory/3340-25-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB