Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 05:58

General

  • Target

    ddcf665b7f46673958cccd0ca46b92e0_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    ddcf665b7f46673958cccd0ca46b92e0

  • SHA1

    1a734315113949d1bb516ea4b427f759c3175098

  • SHA256

    4243d8cec767ff6c23608d9f2d34aa24773ff4af570ba50b023f279b2cef0000

  • SHA512

    6191fd1755fbfbc870dc69f18b167fcfe0429db1dcc5f898e02e9be192a3c2d743dee1a3cbfb84e72b1cd06bbf749fc6c24607a3e129e7b20d426c5a0d32b033

  • SSDEEP

    1536:L3Ebkz9Ui313E7y9Sj8EGNPUKAIpe+cK:L3Jzio1399FEcszYe+cK

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddcf665b7f46673958cccd0ca46b92e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ddcf665b7f46673958cccd0ca46b92e0_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\volumeid.exe
      C:\Windows\volumeid.exe C: 5417-95C6
      2⤵
      • Executes dropped EXE
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\volumeid.exe

    Filesize

    36KB

    MD5

    55505d72af82dfb2903c5d3a73d99f4a

    SHA1

    c8962f6e70c5b0ccf073d0fed632053aa5d6b074

    SHA256

    0b099423a44205e3a46e7801902b8bd0f08892abce9e23e202b0c3f0a8ac6adc

    SHA512

    7f2ce38181ae39753da7a5135b9da76eecb982c0e7085e5f7a4d645c0b8071270c01f9eaf7326ef90bbf9066e699c955c1efc2f71664d5e159a856e52b207a78