Analysis

  • max time kernel
    30s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:29

General

  • Target

    eac3188db1de49c9b748084279796284_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    eac3188db1de49c9b748084279796284

  • SHA1

    f694b0f87c5e6dc435678f14ca1ba50da93f2928

  • SHA256

    06bd318cc01755391848668d46140261703fe965699f34dd48fcb85049dd8183

  • SHA512

    df36a6f81fa8bb4a8e522ab64b1fc6f606e6d6b357ff089917d06ced7650a60c46c3af43a62b35990e0f928f28ba78c2ef78a9379e717a16f3e9496bfda1491b

  • SSDEEP

    384:tczoYdP1jtpypbtB0celpCWDaiBy49vwpPpQ6L0WIc9Qe:OMI1jtMZcl4WDFyqwxS6L79

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac3188db1de49c9b748084279796284_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac3188db1de49c9b748084279796284_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\510.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\510.tmp.bat

    Filesize

    207B

    MD5

    ca815fdae03d31dfaf7b36b4d619c92e

    SHA1

    2a1a78d5feae5b28598878fae1aef67d987d233b

    SHA256

    1bdfd4ac43384a0e45e87f70680b5d14a8d7b01d362ea40ab98b4ceeaf4e8410

    SHA512

    f676d0eb70a805eec4eba1602252f0cd2cd0353facbf14abe37d70ad190ff3cf11e05b8faf505176d72267851638782b5a6c2e1b7332f0d41ac3c8319ea7d918

  • C:\Windows\SysWOW64\ziqfedqt.nls

    Filesize

    428B

    MD5

    e59c68d7ddcda526765a879e63228e1e

    SHA1

    6d26b4ef1f31858e7f1332bb20c2c49d0472ede6

    SHA256

    135b283bdb69aed077557005e816d8b8eeaece4323f4093a76f4eb2d55be1b94

    SHA512

    4ddcbd27da1d5778f1558efc834fd7cc8a1aec7257c40ca3f0c2092a65563906ff85078ed9d7c68c5386d18e6f273ea0345a7e55cac8fcf447684d5b8e43d7b1

  • C:\Windows\SysWOW64\ziqfedqt.tmp

    Filesize

    2.3MB

    MD5

    db268dc124f2a757dbd8aa9146be4f2d

    SHA1

    ddf6525e851f11c5c61afb3db5158a55f74d0130

    SHA256

    57b905ccad8929728b374d1101792d0bdab59a722ef793cd366d6b99dc1df30f

    SHA512

    c6ff8699961dff30e4b7b41a52da1b18a6216b330a499824b7bf5366ea0e96db295ed5d9be2a42f3766c6f7d5acb30a64c8f803c2a21781474d10f15bb16ad43

  • memory/2412-16-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2412-25-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB