Analysis

  • max time kernel
    125s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 09:34

General

  • Target

    ed4f086cec6ebcca17add47eee7c68ce_JaffaCakes118.exe

  • Size

    236KB

  • MD5

    ed4f086cec6ebcca17add47eee7c68ce

  • SHA1

    9e09812c7a6461488275805bfa67c095d68af561

  • SHA256

    ae2c55d97db902836aa071e9730107d63442618abf55e1788fb03d62f3e1b111

  • SHA512

    82ecbc827138bd4561971eab87cd9a4735d7858c8c754ee2c9153c17092124732a15f4a23f38b28fd4420437b0a2f572acfbfbc38e181f58c466bc3d6fd4e685

  • SSDEEP

    3072:UVHgCc4xGvbwcU9KQ2BBAHmaPxlVoIb5ERvi5PZGU:BCc4xGxWKQ2Bonx9P3

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed4f086cec6ebcca17add47eee7c68ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed4f086cec6ebcca17add47eee7c68ce_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\46e8c475\jusched.exe
      "C:\Program Files (x86)\46e8c475\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\46e8c475\46e8c475

    Filesize

    17B

    MD5

    134c1d489094d6d3399f65b0e9aebc1f

    SHA1

    612a57fbe6ed3ab9c15b39451171d813314a28d5

    SHA256

    54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

    SHA512

    b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

  • \Program Files (x86)\46e8c475\jusched.exe

    Filesize

    236KB

    MD5

    ab415ec5fba963fd7ece98a95534ee9c

    SHA1

    95e9aec95db7e866ad8687f97b2eabd9f00060a1

    SHA256

    75b594f3c5d1a3f0df56b46c0c2526838220cff2bc40f16454bb04deee4f4cf9

    SHA512

    3ce37e8c9ca25ee68f27f8cc7d0ec9a86f1dde2264ef7ee6885fb73d01bf20071b07eeb85afd937f9a25af080e88633fb4b22f5c14f905761f8a01ec57849006

  • memory/2072-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2072-7-0x0000000002A50000-0x0000000002A9E000-memory.dmp

    Filesize

    312KB

  • memory/2072-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2228-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2228-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB