Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 11:15

General

  • Target

    f5e2dec5faefc56c21d35c2ef3d8ce46_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    f5e2dec5faefc56c21d35c2ef3d8ce46

  • SHA1

    266b0c06bc27b9deb851b1d5c306b311f97aa67b

  • SHA256

    e62f5386990715dbcbc8362669e71bad3031820ed3ad90bef92544b5990a9402

  • SHA512

    e5615ec11f93bee468a92617d99d2ea2dc4bf18c1b01b83c2b6799743531b10e78d8e0d16409f60ae521aab46d0980a4ba68f5e3a2ebaf3e59d3e97c98d93fe7

  • SSDEEP

    1536:5e0ta0vY5ZXFCx1qtegQza2o6rXaY+9HBxKWKF93kqe47sUC1vZngSls+:40A0vSqx1qtegd6jSBTKF9VbQlngss

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5e2dec5faefc56c21d35c2ef3d8ce46_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5e2dec5faefc56c21d35c2ef3d8ce46_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F5E2DE~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3056
  • C:\Windows\SysWOW64\vifzsk.exe
    C:\Windows\SysWOW64\vifzsk.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\vifzsk.exe

    Filesize

    136KB

    MD5

    f5e2dec5faefc56c21d35c2ef3d8ce46

    SHA1

    266b0c06bc27b9deb851b1d5c306b311f97aa67b

    SHA256

    e62f5386990715dbcbc8362669e71bad3031820ed3ad90bef92544b5990a9402

    SHA512

    e5615ec11f93bee468a92617d99d2ea2dc4bf18c1b01b83c2b6799743531b10e78d8e0d16409f60ae521aab46d0980a4ba68f5e3a2ebaf3e59d3e97c98d93fe7

  • memory/1792-5-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB