Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 07:37

General

  • Target

    e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe

  • Size

    126KB

  • MD5

    e1fe86238968acb0c86eb30df2a053a6

  • SHA1

    a5c8e14462e914c6c00f12155766021ef9db05d8

  • SHA256

    0b2badde7d2548a1157a5d15c258f3de0186e5e9681b4373e1bdc9c76813999d

  • SHA512

    284acbec64ee8f00380da67efb2f0cd3524feacf4732d1e96cba55eeb6f9e1702002fbe5e27083594b23159db5ec1c61a64f70010af12d8fe2fabee4c143d7b5

  • SSDEEP

    3072:lJLmCx/lVDZG+Q6RljqASJwtSFq7PDhPEGSJSnwAHZye6JM:bdM+uFJwtqUdPnSUnXZye6J

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Deleteme.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2220
  • C:\Windows\SysWOW64\F_Server.exe
    C:\Windows\SysWOW64\F_Server.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Deleteme.bat

    Filesize

    212B

    MD5

    987a486d9d3e0117254099ba2add1b45

    SHA1

    943e066b4867f956cb0c9fa4c1adbfde4690ace7

    SHA256

    c21a4af5dde21669a7b064e45a5ba9f1aad8ed8aa9966bc87ca3275cd80aa14a

    SHA512

    31dbf1ca5f690086bf1dc0305009d8b6d6a3d22905e2d83bafd3abb1c3729372120b00339152e1bf6c8c7393175429aa228cb09fc3b4e8fbaddbcb3d2bc67f7a

  • C:\Windows\SysWOW64\F_Server.exe

    Filesize

    126KB

    MD5

    e1fe86238968acb0c86eb30df2a053a6

    SHA1

    a5c8e14462e914c6c00f12155766021ef9db05d8

    SHA256

    0b2badde7d2548a1157a5d15c258f3de0186e5e9681b4373e1bdc9c76813999d

    SHA512

    284acbec64ee8f00380da67efb2f0cd3524feacf4732d1e96cba55eeb6f9e1702002fbe5e27083594b23159db5ec1c61a64f70010af12d8fe2fabee4c143d7b5

  • memory/2308-0-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2308-14-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2652-4-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2652-6-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB