Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 07:18

General

  • Target

    e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    e1f6ffa61eed0e67aa772cb5c2941a85

  • SHA1

    572ee1a01e057a2a412f5dc16712e12f2a349374

  • SHA256

    79c5fa5753fdfb703954131570720b8b7e1d49e8bc3b0c8eb16cc7ba6cbab478

  • SHA512

    e7d41585e3b7b7785135e381ee737e0e6ffbf4e356e2f7063df9d92f70e3c08c7dc8db62478098c93628f47314f4ad680ab1c485140478258f10e3a1b0651ebc

  • SSDEEP

    384:64gflvGtX415aW8n7zI2HiTwM/XX4qSpct5QYr:6VGtXe51koTwM/Xkat5QY

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\pcikk.exe
      C:\Windows\system32\pcikk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe.bat

    Filesize

    210B

    MD5

    5de76a63092fc627064bedafe4c139be

    SHA1

    c0dc4d93a4d0cce9feb8b3ecf2e654bd72bdf174

    SHA256

    6106605595fc2602fb7c91a73556124be05d95d116e41a18637b05d2f7dfa8ae

    SHA512

    3d97f90c05675edbd8e1d2a9cc17990eba972f08e3f74ea3ff8d600655d6c2ccd8b561637efa3861ef2649d6408016130b32e781033354530bc2459020def45f

  • \Windows\SysWOW64\pcikk.exe

    Filesize

    44KB

    MD5

    e1f6ffa61eed0e67aa772cb5c2941a85

    SHA1

    572ee1a01e057a2a412f5dc16712e12f2a349374

    SHA256

    79c5fa5753fdfb703954131570720b8b7e1d49e8bc3b0c8eb16cc7ba6cbab478

    SHA512

    e7d41585e3b7b7785135e381ee737e0e6ffbf4e356e2f7063df9d92f70e3c08c7dc8db62478098c93628f47314f4ad680ab1c485140478258f10e3a1b0651ebc