Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:37

General

  • Target

    eac624ece6d32f74d83e53e729ebdfa1_JaffaCakes118.exe

  • Size

    705KB

  • MD5

    eac624ece6d32f74d83e53e729ebdfa1

  • SHA1

    0e3a351f8e49a0b76e52d7fdb80c35e58726b5ed

  • SHA256

    c553d197c71dc1dbcdf3c7cb33bdd30d27284bdfffd66dc5deaf57df456fdb0c

  • SHA512

    b2f3b0e3bf527428dd25bee824f48c87dee43d46dfdee0ed7ed22fec1841e3f7173816c5cdc97ed0359716dc0c30999c59d16c8dd56d4277364556afb84637bb

  • SSDEEP

    12288:5s1cOlv9M87nf/Ri8aV8IxtymWgNsWSMbhEzCiALJd9qhJnSmctXA:qVLM87f/R9U8pJgNsdMvULcQ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac624ece6d32f74d83e53e729ebdfa1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac624ece6d32f74d83e53e729ebdfa1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Java.exe
      "C:\Users\Admin\AppData\Local\Java.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Java.exe

    Filesize

    705KB

    MD5

    eac624ece6d32f74d83e53e729ebdfa1

    SHA1

    0e3a351f8e49a0b76e52d7fdb80c35e58726b5ed

    SHA256

    c553d197c71dc1dbcdf3c7cb33bdd30d27284bdfffd66dc5deaf57df456fdb0c

    SHA512

    b2f3b0e3bf527428dd25bee824f48c87dee43d46dfdee0ed7ed22fec1841e3f7173816c5cdc97ed0359716dc0c30999c59d16c8dd56d4277364556afb84637bb

  • memory/2648-32-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2648-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3040-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3040-10-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-36-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3040-34-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-21-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-8-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-27-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-24-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-18-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-16-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-12-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-33-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3040-37-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB