Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:31

General

  • Target

    eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    eac3b5c8b29a2da696b3bfe4f3f062a0

  • SHA1

    a80f593f0b42942eeabacf03597993d444569578

  • SHA256

    add205d0c68984196bbc36a34833b3816bc41a63bb0638c3b3c7236df140b1f8

  • SHA512

    0fc46a6ad57e54424f8582bc9292b80f3f94c8e2588e96856b5ca52411c381195d3a9ce7daaf4f35b9556897a1d4e84ab85860472c274fdbf5d00caff3c591f2

  • SSDEEP

    1536:by+/zjdvA8I3eLQAJxa7gRBVBYgLle3li/6AZWIGDVW2Oy:++U3GnxpBVBYgLAVi/6AZWIGDVW2

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Windows\SysWOW64\SysSevenSowrd.exe
      "C:\Windows\system32\SysSevenSowrd.exe" C:\Users\Admin\AppData\Local\Temp\eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3460
  • C:\Windows\SysWOW64\SevenSowrdSvr.exe
    C:\Windows\SysWOW64\SevenSowrdSvr.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:3516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\SysSevenSowrd.exe

    Filesize

    88KB

    MD5

    eac3b5c8b29a2da696b3bfe4f3f062a0

    SHA1

    a80f593f0b42942eeabacf03597993d444569578

    SHA256

    add205d0c68984196bbc36a34833b3816bc41a63bb0638c3b3c7236df140b1f8

    SHA512

    0fc46a6ad57e54424f8582bc9292b80f3f94c8e2588e96856b5ca52411c381195d3a9ce7daaf4f35b9556897a1d4e84ab85860472c274fdbf5d00caff3c591f2

  • C:\Windows\SysWOW64\sevenlog.txt

    Filesize

    57B

    MD5

    f7571c3063c479b9f00fb4fe4f676825

    SHA1

    7fc2eedfff517e264cec5824a31759b777a8d460

    SHA256

    26e4f3cd503bc6a925abbcb97d12dd0f06ff9fa1e8725c356a45bf57c79edab3

    SHA512

    f1733961ef309ea2783a2d8f819337fe2f2406af87cfcba871ffa9468989eeda492dab8bcdfb2ee4ade490e10afe76e2ada31721c5a762665b8dc3617158047a

  • C:\Windows\SysWOW64\sevenlog.txt

    Filesize

    57B

    MD5

    060854e708143da1ebbabd3db0448142

    SHA1

    77ef9b049e4a985eb011830cc73b05d0a65898d8

    SHA256

    c322034c202e1fbb80a7d6874109ee220f27cd09301488e4e36daea4234dd690

    SHA512

    c194d32eb8134c3c8523441c33f8aef14d77fb68d357cfc81ebb1e4866a8f33b92d61f0111b0f6ef28945d15d42a1e80ebbe8038499724a042aafe8c390dbe30

  • memory/3352-0-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/3352-11-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/3460-21-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/3516-19-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB