Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 17:50

General

  • Target

    dcbeb2a9dd3880074ff33165abda91c2_JaffaCakes118.exe

  • Size

    51KB

  • MD5

    dcbeb2a9dd3880074ff33165abda91c2

  • SHA1

    0de609dff2a5a31d52aa4de49774a08d2db98f94

  • SHA256

    6fd1e2b1d4e595b2dbe4baee7053d6cecde81da8cb83fd706371c98712d96cdf

  • SHA512

    eaa74d77fba8a3cb37c42ecd4ddaa6434e4a6a38fc0e6743bd044ba6e01f9d092112eb44a94549db9aa0005d30b0f4ce033e38bbb242ffff6dc26f054ba86fef

  • SSDEEP

    768:yAWcdiE5zC/gkLFIMMbqzVtnHbXLIS1b9iJy6E37hhs:ynoC/gkRIHqzVtHbXLIbaPs

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcbeb2a9dd3880074ff33165abda91c2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dcbeb2a9dd3880074ff33165abda91c2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\33143dcbeb2a9dd3880074ff33165abda91c2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\33143dcbeb2a9dd3880074ff33165abda91c2_JaffaCakes118.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\33143dcbeb2a9dd3880074ff33165abda91c2_JaffaCakes118.exe

    Filesize

    27KB

    MD5

    2347c6bec9fe3bfae654526fa7a468cf

    SHA1

    d2104543d5cce4d7696f6f8c34d50dacae95f314

    SHA256

    11efc25834b666c3737213611546d93142c7ee7e4f3f06576b092036997dbb8d

    SHA512

    9bf8cf2713cc708bc464752fd01b514bc3f74d4d5098164f77a864dd11097323fde0b2c8f1af11fd6829fea9ed7cc5bfd23100305ac98da042fb920267b34b9d

  • memory/3000-9-0x0000000000250000-0x0000000000259000-memory.dmp

    Filesize

    36KB

  • memory/3000-11-0x0000000000250000-0x0000000000259000-memory.dmp

    Filesize

    36KB

  • memory/3020-12-0x0000000000400000-0x0000000000408010-memory.dmp

    Filesize

    32KB

  • memory/3020-13-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/3020-19-0x0000000077C60000-0x0000000077D00000-memory.dmp

    Filesize

    640KB

  • memory/3020-18-0x0000000077C60000-0x0000000077D00000-memory.dmp

    Filesize

    640KB

  • memory/3020-17-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/3020-16-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/3020-20-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/3020-21-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/3020-24-0x0000000000400000-0x0000000000408010-memory.dmp

    Filesize

    32KB