Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:19

General

  • Target

    eaa87b4d6d983cb3194e2ecf826b1e85_JaffaCakes118.exe

  • Size

    747KB

  • MD5

    eaa87b4d6d983cb3194e2ecf826b1e85

  • SHA1

    1bdecd2cd50c2c2019afd7968d5f44cbd83eeab0

  • SHA256

    f45e5bcb6c3b9e40b2428a9ff28ed10f1bf6809373aa82ab4be1221275a0465c

  • SHA512

    9fa5bf78d4e2e6a33e19d56365dbc79333780f58f221c2bfa9ffc57dd74010d216e0859f93beb08cbbcf36e27e921066b353edd4309ca211532cf0d7b5261d82

  • SSDEEP

    12288:v47scuGg2kRrq8VywDmxeR7VJhAX1JXTlro1240IUzm7IB/0z+Rotx9:isaJNwDmxA7VJhAXf9W7k/4+Rotx9

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaa87b4d6d983cb3194e2ecf826b1e85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaa87b4d6d983cb3194e2ecf826b1e85_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\Nero9.exe
      "C:\Users\Admin\AppData\Local\Temp\Nero9.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\Aohya6uBsp98y.exe
        "C:\Users\Admin\AppData\Local\Temp\Aohya6uBsp98y.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          PID:2832
    • C:\Users\Admin\AppData\Local\Temp\Windows 7 Keygenerator.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows 7 Keygenerator.exe"
      2⤵
      • Executes dropped EXE
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Aohya6uBsp98y.exe

    Filesize

    127KB

    MD5

    5f89915ad472e4357f294b74e279b0f0

    SHA1

    f47a6611148b810d2460b1230621414817bb2116

    SHA256

    6c4c163806f0d50d62a5a75ba8eb00921977698956032da9ad7015b38323c4c5

    SHA512

    f8fd9afd2b2cbf845409bd746d2dc0c2921a93808765319d5d48b70a132f71b2a66e549a920fa23e6509a6eefe91cf1f6d1e2c8f55a8844e168c5d4c0f4e3ab1

  • C:\Users\Admin\AppData\Local\Temp\Windows 7 Keygenerator.exe

    Filesize

    290KB

    MD5

    99bf24013acf6d5931a2feaaa0a60f56

    SHA1

    decab29e7b3c744e9eca105345f7f1e2fe5e9959

    SHA256

    f698b982bfb3e24b856d231b1674b7c38075e2fadd6b907825eca1986164907d

    SHA512

    5344180958f2306371383c05b617389fb4ab6c42b6d0252a89095fc4e81bd199dc8aaea4792f1110017c0abf31137440990da3dfba5ddcc7cc623767dbe84d72

  • \Users\Admin\AppData\Local\Temp\Nero9.exe

    Filesize

    490KB

    MD5

    baf4460357c8fcf60f13c22d3a174bb0

    SHA1

    47e3fb6874d3079704659a4ddf0e3b81c2d9dc51

    SHA256

    98557c908e6b351b4d669d4bcdfe59feb0b8a13d91c8f8741db3afc0ba59750e

    SHA512

    2066cb6ca62dbf7f7fe0022fc031c246009d8a88130342a138ad879e5be6c1e4f13bfbde10a668795bc5e769c709f62fcc2d52a4bb59ddd5d89a358b0b1cee8e

  • memory/2276-40-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2312-8-0x000007FEF62FE000-0x000007FEF62FF000-memory.dmp

    Filesize

    4KB

  • memory/2312-9-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2312-10-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2312-12-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2312-22-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2832-41-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2832-42-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB