Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 06:11

General

  • Target

    f55d9cea27f156776f55cfd07951cfd6_JaffaCakes118.exe

  • Size

    263KB

  • MD5

    f55d9cea27f156776f55cfd07951cfd6

  • SHA1

    24ea50221749154b00c04c02ad78353fca8bb759

  • SHA256

    04694e1e39b491903930300faf0269534fadda9e69f765e995a7ed5a7db0a30a

  • SHA512

    db2d982b2111f726dec97b0ab6ba26fadff24b2bcccc9af7834c5e3bc8a954217ffa92107b25324e0fc85bc981f0aef0681ad69bcb791a1309356ad5a905bbe5

  • SSDEEP

    3072:jjkKZWygHY/PlI4pNsDhKhlLXIvWt8OhE025grUN9r+xmI3VeiYxfCpzDnY07VGv:Pn04pqdgXIvWuylfrUiNNDnXVGCa

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f55d9cea27f156776f55cfd07951cfd6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f55d9cea27f156776f55cfd07951cfd6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\f55d9cea27f156776f55cfd07951cfd6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f55d9cea27f156776f55cfd07951cfd6_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\System32\mshta.exe" c:\828ec78e-cad2-4dc7-9eba-870ffbcd18ac\start.hta
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\828ec78e-cad2-4dc7-9eba-870ffbcd18ac\loader.gif

          Filesize

          1KB

          MD5

          e88ebd85dd56110ac6ea93fe0922988e

          SHA1

          684a31d864d33ff736234c41ac4e8d2c7f90d5ae

          SHA256

          379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb

          SHA512

          211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7

        • \??\c:\828ec78e-cad2-4dc7-9eba-870ffbcd18ac\start.hta

          Filesize

          1KB

          MD5

          db4ada697fa7a0e215281533d52578e9

          SHA1

          fb755ea8371edf5065dc53e21eb413603f9eba7f

          SHA256

          f949fd6ca734830572128b4348dfd039419140c7ef501d80773f71ca3f0ed78c

          SHA512

          9ba1d2658785dd3c88b4399132f8330dc58872235e19ca9854b0e453d8cc7a58de0c8be84da376a72b5851073f531c95b2c6afa84f43053561ca8e6751d6e2f3

        • memory/2036-4-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2036-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2036-9-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2036-11-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB