Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 03:51

General

  • Target

    f51cce1695419fe014252b52a09a723a_JaffaCakes118.exe

  • Size

    371KB

  • MD5

    f51cce1695419fe014252b52a09a723a

  • SHA1

    3772c53ee7e6383d2453eaf6f8bcf2168027f793

  • SHA256

    062f3fd612afda79888f4a6e90f9fd7041218930c38f38edd182654c85eaa69f

  • SHA512

    4afe20a3ae7097adf78a13a5a2fa151bca25d36f76aa02d861daf6924a9f8ae67ae94ac6c58ddacbf596655387dbe536caea587251c8d5ce7f23960b15a03641

  • SSDEEP

    6144:MFJ01x2+gt9cEQtLM+S50pe4vMVwW0PNU+sdzWZwzMxyGPR0MI5pKSYi/0ThYP/u:dx2xrcE7X4EwW0PdEWSoVSRgePCT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51cce1695419fe014252b52a09a723a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f51cce1695419fe014252b52a09a723a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\beejheijdj.exe
      C:\Users\Admin\AppData\Local\Temp\beejheijdj.exe 3/7/3/8/9/3/5/6/4/3/9 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
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727236269.txt bios get serialnumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2828
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727236269.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2912
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727236269.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727236269.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727236269.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 372
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\81727236269.txt

    Filesize

    66B

    MD5

    9025468f85256136f923096b01375964

    SHA1

    7fcd174999661594fa5f88890ffb195e9858cc52

    SHA256

    d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

    SHA512

    92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

  • C:\Users\Admin\AppData\Local\Temp\beejheijdj.exe

    Filesize

    631KB

    MD5

    015bb7953acd60ca049320c4abeae2b5

    SHA1

    450cc3464aaa126e6d8bdad2802093e1b31370d7

    SHA256

    6e8ca330ea3eda3742aeced01248aa645e1f93ee23732512b9bb26dfb5009ef8

    SHA512

    33ec30d87abbf5738fae104fbc2951cd7acee9a45e9299db0bba28b84eb869d5be3b43f7ec93ef1e1577d1a15560649e9aefa7dc48bf124b5a81e7af7b2a2268