Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 19:47

General

  • Target

    e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    e9db65748b6a833e556d5c3393cdddae

  • SHA1

    d242e83844f7f82ff8eabf18c3f19313845c7fe9

  • SHA256

    aa32a8d6fe434350d96fc75f3536fc35a8713561d39d2e64893617bc4b4fa1f0

  • SHA512

    41b033189ae8dc7b2f80360d1dfeef3f8584d0dab9b37a7eaf5d3d4a779a53404029474a2f8c76ef78b993ce00c9e9b12cb17c49b0fc61508bd8749ed1c255fe

  • SSDEEP

    384:5tLoqw7DpkFqQon+hJEVNnznQ91XCQ1EA9PoKgLpN:3o2Fg6YNznQ91XCQ1Rf4r

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\C21.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2900

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\C21.tmp.bat

          Filesize

          207B

          MD5

          71f35362cb42fc7a5d5ab18d3289ac66

          SHA1

          a2f8bdb402d635db091bb828e96a8f38a029341b

          SHA256

          555f9a9c33aee643681906e0d38e39a12ffbd4d4da0641e2e4a6732f6c0d6154

          SHA512

          dae94460598251dbd75c6e5d75f5e99d91ccdd0a7e3a2a15b453a088cc88c2ae8bccaeabab9ff1847cef8ed5412bfbf14b7f2397fe0d70a3d82821ec41c63dad

        • C:\Windows\SysWOW64\jfytrcqq.nls

          Filesize

          428B

          MD5

          cb57debbe24ccb28ed9c534ef6171200

          SHA1

          9cdd93a7dcc0f57691bd8764d61cd57db6d4df2a

          SHA256

          161b5bc5b5b330df3b84b5f44d3200388a1c245d4c0483cab12117ca93bd48e9

          SHA512

          f7dcdb18052d0f69e19ad2de8db591755205cb7391c557f1d01d1a82f71851f24b5b78fc50618de5ef024234003989f8356550bee25525ded3ee4284037d9082

        • C:\Windows\SysWOW64\jfytrcqq.tmp

          Filesize

          2.1MB

          MD5

          0a3e3611c33c2fbc12665baac51ef0da

          SHA1

          6f6d06962222fbf8331a8c0434db3792ed0e64ae

          SHA256

          2e374e3e4cbc515fe0c61156edb0370c340648e09653b876ae5220f11962b5c9

          SHA512

          0030428f6ca823364665b968af2def4da5662b7fb5160182134e07d8a2c445e806ca12c0a71f60684cc99c84b12cd991adef317f25f401ab42dbda4f1417f58d

        • memory/2108-16-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB

        • memory/2108-25-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB