Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:11

General

  • Target

    ea8fed7bc859ed027e33caf2f2887ae1_JaffaCakes118.exe

  • Size

    327KB

  • MD5

    ea8fed7bc859ed027e33caf2f2887ae1

  • SHA1

    8c8d3b2aaa90ef4b4731c2b15aaff281c74bbee3

  • SHA256

    c894f85d0eac6d24aaa60e88bd10df364d893c6a2bd33677944262d285ad6c61

  • SHA512

    689960dcae044d1ca78f258bed9a438c8f62aeaf2602c421a4ccaf5bd7f6f27d35a85e55e6b06fbd08cd3a1255d801da698f6c14dfb19fa6c72a5cbe6a191eef

  • SSDEEP

    6144:ZNEFyoj9DXY7r6kHJwie1deZaYIRi+XD4d1BsuilFbADub8P5WArf2Cbcxm:ZNEFymXY7ZDe1ka1M+Ej+lFEY8H+C4

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea8fed7bc859ed027e33caf2f2887ae1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea8fed7bc859ed027e33caf2f2887ae1_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3056
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:1756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      327KB

      MD5

      ea8fed7bc859ed027e33caf2f2887ae1

      SHA1

      8c8d3b2aaa90ef4b4731c2b15aaff281c74bbee3

      SHA256

      c894f85d0eac6d24aaa60e88bd10df364d893c6a2bd33677944262d285ad6c61

      SHA512

      689960dcae044d1ca78f258bed9a438c8f62aeaf2602c421a4ccaf5bd7f6f27d35a85e55e6b06fbd08cd3a1255d801da698f6c14dfb19fa6c72a5cbe6a191eef

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      64576a10c0b880c91baa4aa8e4a055eb

      SHA1

      c41ecb994fbfce1b055a513b7852413ba819bcab

      SHA256

      3ce6aa46d578f2e455f0ab0515346abccc7244be5a1442cd0a8e6c36f86ae9ea

      SHA512

      e52cbd13a8403a5df83e932b3e6570bd46bc8748f610129ad11749ecac459532c03c484652cb1c0d35b57357396bfc95b6fb1a8e72b8ccbd769d51c1b44fdb59

    • memory/536-5-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/536-6-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/536-18-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/536-20-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/536-24-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/2196-0-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/2196-1-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2196-16-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB