Analysis

  • max time kernel
    121s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 18:25

General

  • Target

    e0c5cf2f3842d8ee76c1209304c90b03_JaffaCakes118.exe

  • Size

    423KB

  • MD5

    e0c5cf2f3842d8ee76c1209304c90b03

  • SHA1

    5c849ec994803c11ccbf845474793076e3ed7750

  • SHA256

    140b6a94300ae3033e33e6c7a98f0bf64ddf669926cd1c7b3315c3f3fac6f031

  • SHA512

    7a63a3fb0e50862cb1ac406fc4ea203ba6a7c865291fef6efab7e38269db18f72e7917395a446ab353a0e8507281d328e89c4a15ee9eb7c592a238d63047deb1

  • SSDEEP

    6144:uWrd4M+9IlrTo/6Zcn4T2wKO+y56SPDtpatLKw/HvP+6V+2ltjUDBEiTuNiF1x2W:uapoU2wmy56sp9w/3rqyjohvE0/

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0c5cf2f3842d8ee76c1209304c90b03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0c5cf2f3842d8ee76c1209304c90b03_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\ProgramData\QvigbtS\YfbwslW\FcrocsF.exe

    Filesize

    423KB

    MD5

    e0c5cf2f3842d8ee76c1209304c90b03

    SHA1

    5c849ec994803c11ccbf845474793076e3ed7750

    SHA256

    140b6a94300ae3033e33e6c7a98f0bf64ddf669926cd1c7b3315c3f3fac6f031

    SHA512

    7a63a3fb0e50862cb1ac406fc4ea203ba6a7c865291fef6efab7e38269db18f72e7917395a446ab353a0e8507281d328e89c4a15ee9eb7c592a238d63047deb1

  • memory/1444-15-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1444-17-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1444-27-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1444-26-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1444-24-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1444-8-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1444-14-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1444-20-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1444-22-0x0000000000130000-0x000000000013D000-memory.dmp

    Filesize

    52KB

  • memory/1444-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1444-23-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1444-21-0x0000000000500000-0x0000000000547000-memory.dmp

    Filesize

    284KB

  • memory/2948-19-0x0000000000350000-0x0000000000397000-memory.dmp

    Filesize

    284KB

  • memory/2948-18-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2948-1-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2948-3-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2948-6-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2948-2-0x0000000000350000-0x0000000000397000-memory.dmp

    Filesize

    284KB

  • memory/2948-4-0x0000000000220000-0x000000000022D000-memory.dmp

    Filesize

    52KB

  • memory/2948-5-0x0000000002400000-0x0000000002479000-memory.dmp

    Filesize

    484KB