Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:32

General

  • Target

    eaad722430461a9e6fbdd02bf7486c81_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    eaad722430461a9e6fbdd02bf7486c81

  • SHA1

    22e9d6c6218d628c73e7b08138370b4e4c636328

  • SHA256

    8a045d7a341eb95e36a87097187495a753625c02f0434e199bcfaa159d87f668

  • SHA512

    75ab5cc227e71dba81769b523cc3859a3efb759e6831e88fe3874fab5690787111e2744d5ab4257ffb62e7d9a6d3d65b83d1b04f398fc433a4fe577e34fa5e3b

  • SSDEEP

    3072:piY0iVWpFCnBYEeodSbqYaQd6KBzmY51nXf/v2BiAhIhfQSEJKDv0Bf/T65gA5Ke:piaYSFeocXjTBzmY/P32BD2aSB+qZ7

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaad722430461a9e6fbdd02bf7486c81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaad722430461a9e6fbdd02bf7486c81_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Recycle.bin\Recycle.bin.exe
      "C:\Recycle.bin\Recycle.bin.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\fDV9877.exe
        "C:\Users\Admin\AppData\Local\Temp\fDV9877.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycle.bin\Recycle.bin.exe

    Filesize

    196KB

    MD5

    eaad722430461a9e6fbdd02bf7486c81

    SHA1

    22e9d6c6218d628c73e7b08138370b4e4c636328

    SHA256

    8a045d7a341eb95e36a87097187495a753625c02f0434e199bcfaa159d87f668

    SHA512

    75ab5cc227e71dba81769b523cc3859a3efb759e6831e88fe3874fab5690787111e2744d5ab4257ffb62e7d9a6d3d65b83d1b04f398fc433a4fe577e34fa5e3b

  • C:\Recycle.bin\config.bin

    Filesize

    4KB

    MD5

    895297ac1ee86332f2210208e075b8b3

    SHA1

    3838eb223f06eaefb04a5329f5589b376a76aa03

    SHA256

    3b2a9cf708b4789e520fe28d041565822cf7b397f78ad1842e6c741906df2266

    SHA512

    7a1118c85691567f2a96b35d79e9e9215e14208fdc181b388dcd4296dda01e920ac7e73dd5457c2bbb9717dd1f8cfcfca155329a3b00396bab644519de06aa7a

  • C:\Users\Admin\AppData\Local\Temp\fDV9877.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • memory/756-73-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-89-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-5-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/756-9-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/756-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/756-66-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/756-75-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-71-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-69-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-20-0x0000000000730000-0x0000000000733000-memory.dmp

    Filesize

    12KB

  • memory/756-70-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-3-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/756-72-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-1-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/756-64-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/756-4-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/756-65-0x00000000774E2000-0x00000000774E4000-memory.dmp

    Filesize

    8KB

  • memory/756-76-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-77-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-78-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-79-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-80-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-81-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-82-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-83-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-84-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-85-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-86-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-88-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-0-0x0000000000730000-0x0000000000733000-memory.dmp

    Filesize

    12KB

  • memory/756-87-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/756-74-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-45-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-51-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-42-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-40-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-39-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-38-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-41-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-34-0x00000000005E0000-0x00000000005E5000-memory.dmp

    Filesize

    20KB

  • memory/3056-32-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/3056-30-0x00000000005F0000-0x000000000063D000-memory.dmp

    Filesize

    308KB

  • memory/3056-28-0x00000000005F0000-0x000000000063D000-memory.dmp

    Filesize

    308KB

  • memory/3056-31-0x00000000005F0000-0x000000000063D000-memory.dmp

    Filesize

    308KB

  • memory/3056-44-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-63-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-46-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-47-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-48-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-49-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-50-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-43-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-52-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-53-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-54-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-55-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-56-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-57-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-59-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-61-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-62-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-58-0x000000000BAD0000-0x000000000BB1D000-memory.dmp

    Filesize

    308KB

  • memory/3056-35-0x00000000005F0000-0x000000000063D000-memory.dmp

    Filesize

    308KB

  • memory/3056-33-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3056-27-0x00000000005F0000-0x000000000063D000-memory.dmp

    Filesize

    308KB

  • memory/3056-22-0x00000000005F0000-0x000000000063D000-memory.dmp

    Filesize

    308KB

  • memory/3056-95-0x000000007489B000-0x000000007489D000-memory.dmp

    Filesize

    8KB

  • memory/4440-15-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4440-14-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4440-13-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4440-18-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB