Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:59

General

  • Target

    ea763fd6db0ebd85a955cd8fb8667f27_JaffaCakes118.exe

  • Size

    35KB

  • MD5

    ea763fd6db0ebd85a955cd8fb8667f27

  • SHA1

    2e8b96e3a0bd4598e79b58188a46626a6b1e7b50

  • SHA256

    fb31cfcf9e572a8849326c7ded6dc967b1933a7e8d1652e9feb1039b00371a06

  • SHA512

    5e6411a598ce216339fc00117efae0c42bc8539ca3fbaf4839cdc993984aab3e77b5194a82709c174998bf7fddca5b5358b1bbe0d4f510382b84ad02eccbe386

  • SSDEEP

    768:fgW2qlN3eQJXEHm7vmuPsw1EBWPe88cULN1BMs8KiU:fj2ql8QJXEHSLB6B8UTx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea763fd6db0ebd85a955cd8fb8667f27_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea763fd6db0ebd85a955cd8fb8667f27_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\SysWOW64\servet.exe
      C:\Windows\system32\servet.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3012
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Deleteme.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Deleteme.bat

    Filesize

    212B

    MD5

    81765a9c4c7548fdd2abbcd422c30769

    SHA1

    1ca65f7b13a2372fde9fb3de2ec48852cc762e34

    SHA256

    d1ba9fef83dd438fb8dba0ea34f1e4ff8bd1a31592ac1bf10ce0fbb74aaa5204

    SHA512

    3febe3fd3c9dc6cae765b3d04f5c1c3d3c084841c42cca02f44fb3bff0e36ad08d2b0c36499678a40bc5ff88d27ad9f90a509d4faa2cb4409e75553a9d1d161a

  • \Windows\SysWOW64\servet.exe

    Filesize

    35KB

    MD5

    ea763fd6db0ebd85a955cd8fb8667f27

    SHA1

    2e8b96e3a0bd4598e79b58188a46626a6b1e7b50

    SHA256

    fb31cfcf9e572a8849326c7ded6dc967b1933a7e8d1652e9feb1039b00371a06

    SHA512

    5e6411a598ce216339fc00117efae0c42bc8539ca3fbaf4839cdc993984aab3e77b5194a82709c174998bf7fddca5b5358b1bbe0d4f510382b84ad02eccbe386

  • memory/2428-18-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3012-11-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB