Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 06:22

General

  • Target

    eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    eac08db3fa1c18e939aba316744b3aeb

  • SHA1

    262dd8ad27f510a2a53fdb7e5f8915a82bd108d1

  • SHA256

    9399ffc9d442614d48abd29418d5872405a3a19ac77b9646cf39bf44bb0b0483

  • SHA512

    aac17f8de6f35b740b4bf6d18f55fb2c5f399ff6d902db1fef6c3ce9ce0abb2eb3b21eee85fea537c6fce40fbfaa311edef4d34d722d084aedf2b88acec063de

  • SSDEEP

    24576:s6QJy1KWYl+CyvvgkOYoNWcMTsUEb2UMNKElXS4cWquWmWzeysLWJo:9Dt9OYoNkTsrL4cWquWmWzevCJo

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\usnscv.exe
      "C:\Users\Admin\AppData\Local\usnscv.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\usnscv.exe\"" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\usnscv.exe\"" /f
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 604
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winupdate.bat

    Filesize

    148B

    MD5

    6f893fa27049e87617787e4964ad5ecb

    SHA1

    2efa3418e797e4d5ced66044eff405cb2f93060c

    SHA256

    a9912cc06ab8465ecbf27c5b6887ba94421e213d1fff1467ee1d8f20a72f0b60

    SHA512

    08188fd11947612212701c3fffc253bb69530091115cf6c59650ed70851a8b56b5508cf458df9e742956144be1b3738560a33871a4be782798a63f04b7dae57f

  • C:\Users\Admin\AppData\Local\ntldr.dll

    Filesize

    371KB

    MD5

    261f8f41c5ebde7d803a9f5b54a0a31d

    SHA1

    562b4a28bb63bc1f5fb3e1929542b401613a71c2

    SHA256

    9c4babe2ac629a565f9a6ed31ca9a93b2e764dc5449ecb5b54a05ff154e6a222

    SHA512

    ae3a87d6560c3b9e905b4e76d0c97407fd49dc700ddb2090963e7f51eb6a0cd16a9fa13464425400994d7589334cf0d61d2e06c9a65491bd180f9f8543d28058

  • \Users\Admin\AppData\Local\usnscv.exe

    Filesize

    676KB

    MD5

    04eaeafbb8694b0ebcbfde1aa57a94f7

    SHA1

    31efde2ba3e1e6f9e2260fa06ed5947a088b6579

    SHA256

    de96b38a3e13383e2e9300d03a69706750c170e3bcb8ede863266b4683e58fb5

    SHA512

    3345fa02ee2708d766718cc9b56c93b2096c516e9ea647533379e2f4a54e5ca0ac1bce2348659fe03bcd0d954300fd42acc2ed36ee4f61579839059dbad9a9c7

  • memory/2380-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2380-11-0x0000000004000000-0x000000000417C000-memory.dmp

    Filesize

    1.5MB

  • memory/2536-14-0x0000000000530000-0x0000000000592000-memory.dmp

    Filesize

    392KB

  • memory/2536-15-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2536-26-0x0000000000530000-0x0000000000592000-memory.dmp

    Filesize

    392KB

  • memory/2536-25-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2536-33-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB