Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 04:52

General

  • Target

    ea9ee4883c8b0bd350c5bac8e018be56_JaffaCakes118.exe

  • Size

    625KB

  • MD5

    ea9ee4883c8b0bd350c5bac8e018be56

  • SHA1

    8c606850dd013d5f24ba4f8c145ddc4a7164879a

  • SHA256

    95c8bb2ac9cfeaf75b1767f00954b3927d7979ba9e0b63103a036bf78b3f230e

  • SHA512

    729131af36e477599da296f9ec7e174c30e912e3ddeeeeeea6fb5d17ddc2fcbbaaf0c521dd4bbdc5e4537a14e8cc661497315b13fc4756a1e24e80a2ebd3591e

  • SSDEEP

    12288:vPFUr1iSAjt6JjzlzvcoJ1lUaRSmLtiQexF3Z4mxxGDqVTVOCg:Sr1PAR0RxqmsQmXlVTzg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea9ee4883c8b0bd350c5bac8e018be56_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea9ee4883c8b0bd350c5bac8e018be56_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\DELME.BAT
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2792
  • C:\Windows\svchost.exe -k
    "C:\Windows\svchost.exe -k"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Program Files\Internet ExploreR\IEXPLORE.EXE
      "C:\Program Files\Internet ExploreR\IEXPLORE.EXE"
      2⤵
        PID:2904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\DELME.BAT

      Filesize

      218B

      MD5

      cb907fe248c2c4dbb986da7fb362467d

      SHA1

      f56902d1ae2f33196b3652f5b5403242346a7a1d

      SHA256

      cca6b45aa3830a7a0244dfda35b0165427e6ef5d1596147658b2353c08621dac

      SHA512

      ca8ae9da7daf7abb28b7bb8bcb14557eb2e0200cb8e11c5d299164bc5f4581a347ac710f620d40d109829192d1a3b5ab37a0893b255f4a0075a17230d7b5f32f

    • C:\Windows\svchost.exe -k

      Filesize

      625KB

      MD5

      ea9ee4883c8b0bd350c5bac8e018be56

      SHA1

      8c606850dd013d5f24ba4f8c145ddc4a7164879a

      SHA256

      95c8bb2ac9cfeaf75b1767f00954b3927d7979ba9e0b63103a036bf78b3f230e

      SHA512

      729131af36e477599da296f9ec7e174c30e912e3ddeeeeeea6fb5d17ddc2fcbbaaf0c521dd4bbdc5e4537a14e8cc661497315b13fc4756a1e24e80a2ebd3591e

    • memory/2328-0-0x0000000000400000-0x00000000005B4000-memory.dmp

      Filesize

      1.7MB

    • memory/2328-1-0x0000000001DE0000-0x0000000001E34000-memory.dmp

      Filesize

      336KB

    • memory/2328-2-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

      Filesize

      4KB

    • memory/2328-44-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-43-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-42-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-41-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-40-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-39-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-38-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-37-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-36-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-35-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-34-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-33-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-32-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-31-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-30-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-29-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-28-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-27-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-26-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-25-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-24-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-23-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-22-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-21-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-20-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-45-0x0000000000400000-0x00000000005B4000-memory.dmp

      Filesize

      1.7MB

    • memory/2328-19-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-18-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-17-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/2328-16-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/2328-15-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/2328-14-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/2328-13-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/2328-12-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/2328-11-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/2328-10-0x0000000001F60000-0x0000000001F61000-memory.dmp

      Filesize

      4KB

    • memory/2328-9-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/2328-8-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

      Filesize

      4KB

    • memory/2328-7-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

      Filesize

      4KB

    • memory/2328-6-0x0000000001F40000-0x0000000001F41000-memory.dmp

      Filesize

      4KB

    • memory/2328-5-0x0000000001F50000-0x0000000001F51000-memory.dmp

      Filesize

      4KB

    • memory/2328-4-0x0000000001FD0000-0x0000000001FD1000-memory.dmp

      Filesize

      4KB

    • memory/2328-3-0x0000000001F70000-0x0000000001F71000-memory.dmp

      Filesize

      4KB

    • memory/2328-58-0x0000000000400000-0x00000000005B4000-memory.dmp

      Filesize

      1.7MB

    • memory/2328-59-0x0000000001DE0000-0x0000000001E34000-memory.dmp

      Filesize

      336KB

    • memory/2556-49-0x0000000000400000-0x00000000005B4000-memory.dmp

      Filesize

      1.7MB

    • memory/2556-61-0x0000000000400000-0x00000000005B4000-memory.dmp

      Filesize

      1.7MB