Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:32

General

  • Target

    eaad722430461a9e6fbdd02bf7486c81_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    eaad722430461a9e6fbdd02bf7486c81

  • SHA1

    22e9d6c6218d628c73e7b08138370b4e4c636328

  • SHA256

    8a045d7a341eb95e36a87097187495a753625c02f0434e199bcfaa159d87f668

  • SHA512

    75ab5cc227e71dba81769b523cc3859a3efb759e6831e88fe3874fab5690787111e2744d5ab4257ffb62e7d9a6d3d65b83d1b04f398fc433a4fe577e34fa5e3b

  • SSDEEP

    3072:piY0iVWpFCnBYEeodSbqYaQd6KBzmY51nXf/v2BiAhIhfQSEJKDv0Bf/T65gA5Ke:piaYSFeocXjTBzmY/P32BD2aSB+qZ7

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaad722430461a9e6fbdd02bf7486c81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaad722430461a9e6fbdd02bf7486c81_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Recycle.bin\Recycle.bin.exe
      "C:\Recycle.bin\Recycle.bin.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Users\Admin\AppData\Local\Temp\GTiE263.exe
        "C:\Users\Admin\AppData\Local\Temp\GTiE263.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycle.bin\config.bin

    Filesize

    4KB

    MD5

    895297ac1ee86332f2210208e075b8b3

    SHA1

    3838eb223f06eaefb04a5329f5589b376a76aa03

    SHA256

    3b2a9cf708b4789e520fe28d041565822cf7b397f78ad1842e6c741906df2266

    SHA512

    7a1118c85691567f2a96b35d79e9e9215e14208fdc181b388dcd4296dda01e920ac7e73dd5457c2bbb9717dd1f8cfcfca155329a3b00396bab644519de06aa7a

  • C:\Users\Admin\AppData\Local\Temp\GTiE263.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • \Recycle.bin\Recycle.bin.exe

    Filesize

    196KB

    MD5

    eaad722430461a9e6fbdd02bf7486c81

    SHA1

    22e9d6c6218d628c73e7b08138370b4e4c636328

    SHA256

    8a045d7a341eb95e36a87097187495a753625c02f0434e199bcfaa159d87f668

    SHA512

    75ab5cc227e71dba81769b523cc3859a3efb759e6831e88fe3874fab5690787111e2744d5ab4257ffb62e7d9a6d3d65b83d1b04f398fc433a4fe577e34fa5e3b

  • memory/1740-13-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1740-18-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1740-14-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1740-21-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1740-73-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1740-30-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2084-55-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-49-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-33-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/2084-32-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2084-37-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2084-34-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2084-75-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-74-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-26-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2084-72-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-70-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-69-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-68-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-67-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-66-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-65-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-64-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-63-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-62-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-61-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-60-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-59-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-58-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-57-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-56-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-107-0x0000000075224000-0x0000000075226000-memory.dmp

    Filesize

    8KB

  • memory/2084-54-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-53-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-52-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-51-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-50-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2084-35-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2084-41-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2084-40-0x0000000000160000-0x0000000000165000-memory.dmp

    Filesize

    20KB

  • memory/2084-38-0x0000000000460000-0x00000000004AD000-memory.dmp

    Filesize

    308KB

  • memory/2504-83-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-6-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2504-88-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-96-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-39-0x00000000003D0000-0x00000000003D3000-memory.dmp

    Filesize

    12KB

  • memory/2504-1-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2504-76-0x00000000772AF000-0x00000000772B1000-memory.dmp

    Filesize

    8KB

  • memory/2504-79-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/2504-77-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/2504-85-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-81-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-82-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-0-0x00000000003D0000-0x00000000003D3000-memory.dmp

    Filesize

    12KB

  • memory/2504-3-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2504-4-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2504-95-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-94-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-93-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-92-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-91-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-90-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-89-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-87-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-86-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-84-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/2504-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB