Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe

  • Size

    289KB

  • MD5

    ea7c2c135472c4c1ba093c035c63d591

  • SHA1

    8a21d4efef350a029c3b15a9a0d1e33be73af2d7

  • SHA256

    a7f7c22178181bd6a7acb13a04b0e9eed898d7271a4cfbcbb6b12bc5e99b22f0

  • SHA512

    d92af2519d1911f5e85a9e0f6fe0027ebadd98fd77feb13b7fee37579bab1024911e56f076ab9a1fc85e67671b699df63f8923858b21f24cde9c51aea7ce6fc8

  • SSDEEP

    6144:oMsYO6DtvSsCvarzwtdmUc/11wZB4sOmF9NGkihH/aRG44BZj:ojKtasHAtdFc/YZB4sOs/GffC4BZj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\A795.tmp
      C:\Users\Admin\AppData\Local\Temp\A795.tmp
      2⤵
      • Executes dropped EXE
      PID:2696
    • C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe" --cp "C:\Users\Admin\AppData\Local\Temp\A7C5.tmp"
      2⤵
        PID:2832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\A7C5.tmp

      Filesize

      289KB

      MD5

      0d9edee401e3e73cc9d6b6e1e60f3f33

      SHA1

      7161f07394fc7381dfc4b8b60b28c1254b06b4b0

      SHA256

      1cb642003ab446729ac6cb21695e22a74e7c7e1cac88e4b749439d7e1851fdb3

      SHA512

      5fa521c28733a0b620f283aaae81782426d9cf7471fcb88b27d42cc5c6cb4bb142b478065ae845f19569b4f6b9c5d16f8da62b89c8da4fca4473f9c4535ed1c1

    • \Users\Admin\AppData\Local\Temp\A795.tmp

      Filesize

      242KB

      MD5

      d2cd591a98dfd67d2d86f33f37d12def

      SHA1

      e7fa1b1780a3f289d9dceb6e6bfedff20b3a7f05

      SHA256

      bce4c1b88a93d3e818d9524878750d014afa0dad619bfd648c8c285102164b08

      SHA512

      3cb1d765e674c6a82b4c271adcb34f5f930367feca22803fcb7099a202f9422eb19268031069ec2deacf427a76085465002efba217dd92ffecb95af51ba6ea2b

    • memory/2440-0-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB

    • memory/2440-2-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB

    • memory/2440-9-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB

    • memory/2696-21-0x0000000000400000-0x000000000043E100-memory.dmp

      Filesize

      248KB

    • memory/2696-22-0x0000000000400000-0x000000000043E100-memory.dmp

      Filesize

      248KB

    • memory/2832-14-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB

    • memory/2832-15-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB