Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:19

General

  • Target

    eabf439a5bc49eec0ca32278e7673311_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    eabf439a5bc49eec0ca32278e7673311

  • SHA1

    312a1c4e37a96f4507f8b3075784e957b7155755

  • SHA256

    58e19d3ea468ed30dbf7d2b84186a3276eb8263b701f67d7255435f9fa0edc68

  • SHA512

    b82223462f7d034245330bbbf6ce701da5fdd8040abd94e31aa27f4bd296454a565fb6b2ddebe28ed2d7d33a11f9d2dadd813bdbd2e4a71a022644260f313f6b

  • SSDEEP

    768:PTAm5hiTllzeF/AJOTmbWa8RYdiU3/7Shy5nv9/tw/xmcQM/:PLIcNTcWATPuhI9a/x4w

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eabf439a5bc49eec0ca32278e7673311_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eabf439a5bc49eec0ca32278e7673311_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Windows\Explorer.exe
      C:\Windows\Explorer.exe
      2⤵
        PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\NNYJZAHP.com

      Filesize

      39KB

      MD5

      d26fc3fdfe36b229c600a3474c6a4915

      SHA1

      ec8c923d0763655c7ae2d880486896fc79e86c3e

      SHA256

      43905e3f480173e01514be4cd98baf57729320d6b22d999f1459c6edc82d7205

      SHA512

      18f0968141b2eb6b238f06dbfa73041d3c6202124e6159020d0ce0f83bedb2b0228d6f56e45f649b55376437e6dd3e540babefdaef4e3a20880ef574c0b1e39e

    • memory/1508-1-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB

    • memory/1508-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1508-28-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB

    • memory/1508-29-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1508-32-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1508-43-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB