Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 10:45

General

  • Target

    ef9fa5d9dc48cd4f0c2e1166175970a8_JaffaCakes118.exe

  • Size

    459KB

  • MD5

    ef9fa5d9dc48cd4f0c2e1166175970a8

  • SHA1

    3bd3e47bbcba5e25e99ad5f16b59054ee6ba459c

  • SHA256

    6ac3ac762de5215b6877ab7c8c2ef412d1ee26dc214a3920fc77b9eb368c411c

  • SHA512

    6b61f88be6dd1aff246ce4e25c3d465aef940551e74d6a7bbb80ab326e08c2e675c2fb342830b61a0ed4bd550fb8769b68510c8f44edb3811603fe7dc1c4fcfd

  • SSDEEP

    6144:SWqA/eRwp0yN90QEq9Y5+yWFx5EcYkr+0ps0OApyiEkJJnJFg2JO0oNkJHCcttaU:7/eXy90I9Y5xCx+v0OPM9JuL0oNeCc

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef9fa5d9dc48cd4f0c2e1166175970a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef9fa5d9dc48cd4f0c2e1166175970a8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FREEBO~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FREEBO~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FileSeek.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FileSeek.exe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab71A9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FREEBO~1.EXE

    Filesize

    72KB

    MD5

    1f15563fa47f93479677a2763be77651

    SHA1

    5b9d483aaed8635f4e8cbdeb16008bbfec80dc66

    SHA256

    83a79201875a88a1ba3e980bd7e17692c78b9e9623e682d96edeb414f06f0694

    SHA512

    7a347991b3ccb1b11d3fb5ec78e2d648664a99ce7104f81070995281e8ac246d9c159db24d2fd9308298b9e4d73d7cf879fc2bc0ce6a505f533659706b727f47

  • C:\Users\Admin\AppData\Local\Temp\Tar720A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FileSeek.exe

    Filesize

    538KB

    MD5

    265f57140616e8d271af75f987a1ccf5

    SHA1

    871fecf7161a1527d6a465d2dbfbc0fc3e28f615

    SHA256

    d2d5944ca885678327eed5649c2ac833f6235797b748ce1d2c39cd3be70e1b68

    SHA512

    58c3b77caf443dc80f59046886aaf6cb3c4cca0c03c5d15935cb83d7aa3624b0f39806a37d3ad22b9bb7164dfc6eeb455182bae80fe0c41043ff058280d15d54

  • memory/2932-19-0x000007FEF5AFE000-0x000007FEF5AFF000-memory.dmp

    Filesize

    4KB

  • memory/2932-27-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2932-81-0x000007FEF5AFE000-0x000007FEF5AFF000-memory.dmp

    Filesize

    4KB

  • memory/2932-82-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB