Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 13:13

General

  • Target

    e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe

  • Size

    9KB

  • MD5

    e0412c47c09f4a83204613b30f6c7862

  • SHA1

    52974f76a7001396cf2acb9f8d67753a513d9106

  • SHA256

    4b9908934a7fd095db727b9ee19471ff2d5dc64a5a146e875410d142db4d6f87

  • SHA512

    70884673b819c49e524b0f2278ea24b84b14642cc5bbd5fb155eed71e326da8b6754edd38abf5caeadc7e6ad732360c2bd4b27b9caaff4889f12c373708ef563

  • SSDEEP

    192:UAhUJOeBfmrRlTf5nATOSQKEPRDsjnhVIFHaPFA:UAhU4FVj5Dsjnh0v

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\E753.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2096

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\E753.tmp.bat

          Filesize

          207B

          MD5

          c46ade2fae3cf55cc6e7da38e3b14c3b

          SHA1

          2773a18fa672c7aecfbc1876a7db5cecb5e63478

          SHA256

          80e42186fd4792b55abcbf065a3bd56a1550c0c3f54f0de4fa8fefaa4174cb18

          SHA512

          877ce8eec0a7db59fd583243c421b7b03650bdbe1deb05b051c8afb0b1629a492f028a6fa5beca4e7962e123d6ae3bc5f4e929762261e77060e9f41a500ebe7f

        • C:\Windows\SysWOW64\midimaptl.tmp

          Filesize

          1.0MB

          MD5

          c56e739fd01201e05cb5609ae1c8c2ae

          SHA1

          b52a5d2d093f794aff3d336b6fb1ad2e259e1d7f

          SHA256

          405baa8438789d3d86cfd46cfeefe7d5d544164f46a5403430e6d1320515209c

          SHA512

          0d072ac3505f10199c14941000353d2af29e5f4c7f16a2bbf8fd1d70b47d04f17ed9ffaa7197d0ba76ff0503e44f0c2b90f704fff4cdd93c5da16b13f6b7a347