Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 06:03

General

  • Target

    ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe

  • Size

    310KB

  • MD5

    ef3246f2037fe7dae314bbfc2b8ee882

  • SHA1

    68b878ba4dddf51c430f3f09193132f9e8077ccd

  • SHA256

    7b8be4068e38665975aa6db55615ae9a13467a1819c2fbd68e6ae9a17982daf5

  • SHA512

    92f23905100d92536b4120a33092247fca2daf930f8c5153b0426ca1d86adf54ba7bc62e5ce065d5f76b9b50ce19851156ea919a0981dbd16719e60b469e3dbb

  • SSDEEP

    6144:pSHHPAWjbyoGTXzSbvUcjEXyaHEWNpesMvT+0GvefwHUfy59+oyYyMCr:wHxbyomz6VjErkWLbksUfy59+dYyM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2068
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\WINDOWS\SysWOW64\svchost.exe
      C:\WINDOWS\system32\svchost.exe
      2⤵
        PID:2300

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      310KB

      MD5

      ef3246f2037fe7dae314bbfc2b8ee882

      SHA1

      68b878ba4dddf51c430f3f09193132f9e8077ccd

      SHA256

      7b8be4068e38665975aa6db55615ae9a13467a1819c2fbd68e6ae9a17982daf5

      SHA512

      92f23905100d92536b4120a33092247fca2daf930f8c5153b0426ca1d86adf54ba7bc62e5ce065d5f76b9b50ce19851156ea919a0981dbd16719e60b469e3dbb

    • memory/2068-14-0x0000000000400000-0x000000000053E000-memory.dmp

      Filesize

      1.2MB

    • memory/2068-1-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2068-2-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/2068-3-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2068-0-0x0000000000400000-0x000000000053E000-memory.dmp

      Filesize

      1.2MB

    • memory/2300-19-0x0000000000400000-0x000000000053E000-memory.dmp

      Filesize

      1.2MB

    • memory/2300-17-0x0000000000400000-0x000000000053E000-memory.dmp

      Filesize

      1.2MB

    • memory/2300-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3052-11-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/3052-10-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/3052-9-0x0000000000400000-0x000000000053E000-memory.dmp

      Filesize

      1.2MB

    • memory/3052-22-0x0000000000400000-0x000000000053E000-memory.dmp

      Filesize

      1.2MB