Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:26

General

  • Target

    eac1bd1acc2a4c67012763e8c79ebf47_JaffaCakes118.exe

  • Size

    575KB

  • MD5

    eac1bd1acc2a4c67012763e8c79ebf47

  • SHA1

    077728185888881142d005c9444b6162be7fd5b3

  • SHA256

    12009e897e5cceb35fb530c8694311ca14d01063c09304cc6aec8da736f05c5e

  • SHA512

    ef9345c37ad1075eafee5e636734b69b1417a7545e34e7a40af7ab647a525a1c98acdda83f9d58d23f08e459547e55717a16c6a4a7e36ba63a884542e621c4cd

  • SSDEEP

    12288:pET9pBBVBIVoODuVZhjcvllSa8NHjQr50jku:8OicvP8NDQr50jku

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac1bd1acc2a4c67012763e8c79ebf47_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac1bd1acc2a4c67012763e8c79ebf47_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\eac1bd1acc2a4c67012763e8c79ebf47_JaffaCakes118temp.exe
      "C:\Users\Admin\AppData\Local\Temp\eac1bd1acc2a4c67012763e8c79ebf47_JaffaCakes118temp.exe" /temp UU "C:\Users\Admin\AppData\Local\Temp\eyeperformUninstall.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    a0af4d81b2b19a99a3d01be89d5f99d9

    SHA1

    4725c1a810005f860ede9dace7f1e5a20e5230d6

    SHA256

    de9f05ceb1610cf9964f0def09d525005569602993c82a647743f192e9414d4a

    SHA512

    eb98d475d51d07b929d92fe5aa00bfa21078f567906f3650eb3bebfff39c616a21918da8f0687853310acebdb160d4f65451204619a7b8085fbbc25491bb0554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_F55A6376BD847C7F9C04129C5E8C4739

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    77KB

    MD5

    cd799e61bcc6dea3d2e40f79305c3c45

    SHA1

    3a08c709a35648c3f958504347eee910e4f7b6d6

    SHA256

    d679c6d314c4b24d859bf23e4c43c50c21056aa48ca056751a8d2a445c0e7873

    SHA512

    8b4e4743c08eaafc9b7f4061ad815ec9f785632e8f5c07487aa8906022beddb190f9575c0e7677de15041c27372dd2b41d5247e0ceaf3dee6e08bcb5662da442

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    c4c725af8cf5a4d383ec049729b8ff16

    SHA1

    42d111caf2d58c8783a5f50e17d9679b2a86ca76

    SHA256

    23606dbc84de2ae58f676da0aed2c3ed76e940ff20cf00ecbbe0c3ba9aef0b95

    SHA512

    ba56909e21a27fbf3412774bc18bb0b59fd60300d7f4961577b8113cedbcb713bc95f32c744ba2f074122f1087961cf002572e9ca08b7e2eaa0bf6eaa600d325

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    0e91545b9d77a40f134bb6869d1d0d6b

    SHA1

    9869cdcfb0cd34bfc91711b69cd828aed96effa4

    SHA256

    334db0f4d4c0721202593c8ed292510a26619d9c4b19b515ce212282606f8520

    SHA512

    126932c8d02d76ca1a300048e47d8d33e27d97666abb68c2204fb00f0e94e096e83a13a2316c21a3a5cea77056bf653eaf8fea101c4fb750e046e9b8d169a608

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e33b2ffb667e6aea0ec804bd1d03340

    SHA1

    773dadb9a9980fd6ef211ddda0ce3de14efc0e0d

    SHA256

    0550062dc2436d38ce156db2ef9cef6ad882c48d5072d156b20d184ef7df2716

    SHA512

    906b137fff105a2ec3ba4a47b00f2b50a783dc7f4b9e18d2565576e2efa340ac807e604d0349a2c7422a1de73b979f03a8128bcebb03e0d0f7e5c02ac5a9bc8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_F55A6376BD847C7F9C04129C5E8C4739

    Filesize

    398B

    MD5

    52e3b3bfd20d0b7beee37a5b985b2a26

    SHA1

    8650f411b6f434d48b19d5152d3432e75d208940

    SHA256

    0ec39392dff733e2c9f72afa3ba76a5b9225b9dd6cc414c2f5bb5e6bb43d0bc5

    SHA512

    30b1cd8758318f314d5ec7c61e6c9b8c4b2bb8934a25718502f2051afcc46478dedf6f06be5f938864a3660dd9531f020bd9209952e3d8df1cdfed4e297a7cb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    24017e476894670593d6a2061733ef42

    SHA1

    668854419f7d80321a074bb2efb22d4237cf7180

    SHA256

    343e4925777bd05fc064a0493b9d321c28a42807aaabc4fc07eb65941a5f2588

    SHA512

    a68e203262f936bc50bf84142564f47074573fa1d631f04acf5ef169cea23285fcacc8afab6f67d5e28b1cbd90c0cd5e3ea48b6f58b27ca7fb671b487b9faa42

  • C:\Users\Admin\AppData\Local\Temp\CabE64C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE66E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\eac1bd1acc2a4c67012763e8c79ebf47_JaffaCakes118temp.exe

    Filesize

    575KB

    MD5

    eac1bd1acc2a4c67012763e8c79ebf47

    SHA1

    077728185888881142d005c9444b6162be7fd5b3

    SHA256

    12009e897e5cceb35fb530c8694311ca14d01063c09304cc6aec8da736f05c5e

    SHA512

    ef9345c37ad1075eafee5e636734b69b1417a7545e34e7a40af7ab647a525a1c98acdda83f9d58d23f08e459547e55717a16c6a4a7e36ba63a884542e621c4cd

  • memory/2708-69-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2708-0-0x0000000073C01000-0x0000000073C02000-memory.dmp

    Filesize

    4KB

  • memory/2708-1-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2868-70-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2868-71-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2868-88-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2868-89-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB