Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:26

General

  • Target

    eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe

  • Size

    131KB

  • MD5

    eac208eaaeade3d7b93abf20e490c070

  • SHA1

    661c2227fd98d07cb313491918e96696bc3ef1ed

  • SHA256

    47ff5712479094b9b0f56f8355c79f68e6c1cf0a73df81941ba4e15d7869615a

  • SHA512

    db699e4154e38de1cd29a7a5986ca17cb1e246075c5b76bcc50e762cc6ef089d7e45141d808ed79887ef3f1b76c73ba5231a1c41862f24180dc9019590c9f6ac

  • SSDEEP

    1536:XR6JlmvbgqIKrHkgtuf3O7nGgarSgRwvvwLm8NJLFAKJMV5Vy6KKUKw0Fdnu4w6v:XR6Jk/Ef3OCgaqvYLm8PHRPKUzTksyZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\Qfiwea.exe
      C:\Windows\Qfiwea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Qfiwea.exe

    Filesize

    131KB

    MD5

    eac208eaaeade3d7b93abf20e490c070

    SHA1

    661c2227fd98d07cb313491918e96696bc3ef1ed

    SHA256

    47ff5712479094b9b0f56f8355c79f68e6c1cf0a73df81941ba4e15d7869615a

    SHA512

    db699e4154e38de1cd29a7a5986ca17cb1e246075c5b76bcc50e762cc6ef089d7e45141d808ed79887ef3f1b76c73ba5231a1c41862f24180dc9019590c9f6ac

  • C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

    Filesize

    372B

    MD5

    1913cef99a91236bcab058c26dfc8530

    SHA1

    ec2e78a147f1a0d96d685d7cd142195ba1993918

    SHA256

    7ce5b153e59500f31d01f8270a1eac03474220bfb624344cbe861283e8ded1bc

    SHA512

    71f9a5d1f02b93d8b7b4f5dc4ccfb36551247aa98679c9f1508e01e8f26ab4230aa13dd7fe0530ef3313102c11b9aaa502a0104413bcab223d008e9e1b5e25e6

  • memory/2652-8093-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2652-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2652-0-0x0000000000260000-0x0000000000273000-memory.dmp

    Filesize

    76KB

  • memory/2652-43071-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47732-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47736-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47730-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-8-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47733-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47735-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-31902-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47737-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47738-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47739-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47740-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47741-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47742-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2752-47743-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB