Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 12:24

General

  • Target

    e279cf4bf53a5772a47856ed1e13740c_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    e279cf4bf53a5772a47856ed1e13740c

  • SHA1

    036d23bb4977924e9a2e9bf23dfad050acab3969

  • SHA256

    09a5debc8f6022164574510468b14961c1dea0c99fa606a8a1eb0923e6a0ccb7

  • SHA512

    ebbfaf9857d4abcbfccb25d192d5a95090f22528d83e73ac617d7967ec295d5a191dedd52aed156d43383fee9457626bceb8717f05505ee9f91f4d3d9a355d0f

  • SSDEEP

    768:HYjieHaCD4zrcWTEFGzktfIhninsd2DssJggoy8SFx1659nH38BDY4UxWha5t:yieHaCD4zoWT2Gzk8inHDssOZnVH3MDu

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e279cf4bf53a5772a47856ed1e13740c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e279cf4bf53a5772a47856ed1e13740c_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\1.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2744
  • C:\Windows\RealtekControl.exe
    C:\Windows\RealtekControl.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.bat

    Filesize

    261B

    MD5

    fad3e81d51f1e79cc16e7100f83f4f25

    SHA1

    414760fa360badd8e38eeb403d8ad31fcf2320b0

    SHA256

    bd01b606dc6371edb887cad5a8b4f694368004c74622e72cc1bc4db2fae29f2a

    SHA512

    757ca6bb40c8bec813410c46d7c755bb168025a2e0116de9a8bc9c5b9b8a9f00be2d8a25b8ff5619bde0602be8a8ed5cdae0b331bd61e799e70721c229b22d26

  • C:\Windows\RealtekControl.exe

    Filesize

    34KB

    MD5

    860fea1fc357cb5c03d68aafa09822d6

    SHA1

    178f9b085b844bde52a475c233831749d2354cd7

    SHA256

    e6e0f3a009dbdc8d279bcf7b6d929af72d4fff368a68a8cf9004370fbc7b448b

    SHA512

    80d5092e8e2da551e4b785365667c96cfe2f3a29505473a1e6596fe569d6d2bc9ac7412c0db381d2da6f8f2460f1a4c93b1020cc321e157f0aa509f8aa436f8c

  • memory/2344-7-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2344-18-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2344-19-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2344-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2344-21-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2344-22-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3004-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3004-16-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB