Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 08:34

General

  • Target

    eaf44eb6ca8aa684a92a7ee893011887_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    eaf44eb6ca8aa684a92a7ee893011887

  • SHA1

    8ec5feb5cb89c28d3a09391a4c7a1571f1591226

  • SHA256

    01056b8ace60d18ad5561b0cb12f7daadd2ff728fea23654946380129400200d

  • SHA512

    f0cecd8057c52ef58be2058a6bde052903d933c58681f3a873cc1fabbe154b48f78cf07bc3add5c41d23b894375e2fbc267a805d7598598d6c017732d039ca33

  • SSDEEP

    384:3mssBPv+VuPSSCpujfi/4dq8XMQMVzT5E:3mL+kPrCpujfc4dq8XMQMhT5E

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaf44eb6ca8aa684a92a7ee893011887_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaf44eb6ca8aa684a92a7ee893011887_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\6AC4.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6AC4.tmp.bat

          Filesize

          207B

          MD5

          75fc9ea7339d3442b3844c04ec58dd45

          SHA1

          fc598539c217cbcdbbadefa2e6772b3ac6672b46

          SHA256

          ebdc37beeaed02c67f232be5fa14f346ef8104473cb76011ab907255e092922f

          SHA512

          3cd43550a9f031e572712f0c3acfbf2c5366f5ebc67a250e72c930d2fe9995dd0fe2fb6cfd4d1665a795b26012b87e9ef80014d6f523ff840e5184334eb1983c

        • C:\Windows\SysWOW64\kbdgrms.nls

          Filesize

          428B

          MD5

          7d79f0657e470341e4a73c4f745591a1

          SHA1

          46b50e7d4ee6a695db6e685a1fb24af40e45c715

          SHA256

          daf1f5fa0844739426f5e98cb18ec357eec26789177010de1d1eb7816e9eaf46

          SHA512

          7b105c9d3a937e93e8a5dbd25dad3d52ad3308cb13bd1b0fe655efd94043d519aaa5a7b50c20673c40c62de580d1fdf4f19943ec85cecda8a94a8949d7d217e0

        • C:\Windows\SysWOW64\kbdgrms.tmp

          Filesize

          811KB

          MD5

          3bd1ce14d6f8119d239e42a6aeb947bc

          SHA1

          3e96f626c5b0934ea8dac5bad004ed6438817019

          SHA256

          c52525a2358d7f4e0ccc2c25869e793bb3035090d8676a3fee73e71d8f152c22

          SHA512

          7bce04712f7afda0137fa4acad1e2d3f5ffa6c43ef2ac6a24c6297b2ad682461900a78d726a4c329d4ee64d48184910c4a3d23b3d9fcec6d654d7e1d34955488

        • memory/2748-16-0x0000000020000000-0x000000002000A000-memory.dmp

          Filesize

          40KB

        • memory/2748-25-0x0000000020000000-0x000000002000A000-memory.dmp

          Filesize

          40KB