Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 21:29

General

  • Target

    f0a61fcedddc49fe619af4bb3a9e4082_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    f0a61fcedddc49fe619af4bb3a9e4082

  • SHA1

    500c4b2d91e65526bfd47365a26b458c03b61eb5

  • SHA256

    975d52d1f5c41501e2292b3a1188490c159d7eec2cfbc9561876aed87c57e28b

  • SHA512

    5e877eb18c90fe1689c9f81e052ad6101ec2d85a37a44aa3331643be2b0f03dcf0ee674ce24f15c3a2a631f0038e69f28be15c5a0c1e72a66fade7471ca6fe45

  • SSDEEP

    768:ApHWjwZz38B+1Ma3XiK69Y5mVvPhoH5tp+xcIrR7tOGAU1U:2WjwVx15ns9GAHOr+xcIhq

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 37 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0a61fcedddc49fe619af4bb3a9e4082_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0a61fcedddc49fe619af4bb3a9e4082_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:2440
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k zczpcxao
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\zczpcxao.dll

    Filesize

    54KB

    MD5

    c722d19c6c3866cc539597c93ac629e8

    SHA1

    5ed641a9f828c6fa183ce8440d4f910a86d1b50e

    SHA256

    40fe53d3508843c17f1cb910ce4bfd81ab84ffba19f385f529c7434264fb5e12

    SHA512

    0eb43feba8b6d7cae0431736a088d6dbf22158f1e87c0e67f607aa8045a77a86c15e2d781d1ca0bae64eeb3016ce1389ccded2d562ba2b7be7289a9488b83da7