Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 11:43

General

  • Target

    f5efa2fa1406b0557062d4710b25c226_JaffaCakes118.exe

  • Size

    9KB

  • MD5

    f5efa2fa1406b0557062d4710b25c226

  • SHA1

    5bc94ef17fc17de2aa9289acdd2e8b174754572e

  • SHA256

    aa9aa5bdf67dc42a4f1291424a594f278840995553badf440305c1dd8095911d

  • SHA512

    69011f344a55c8407df4c76d796240090c055ba9345291170513e65336e8458a0daef17a256fabb8ca7caf8c99f5da73136a474b8ac27e8635779329625382d0

  • SSDEEP

    96:sBSceLqQ9HuHnnwR2U12CGbcGfbkNTWOqCE07OoIOsBc4D:1R2Q9GnwR2MSrwNKOqt05/WzD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5efa2fa1406b0557062d4710b25c226_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5efa2fa1406b0557062d4710b25c226_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\hromi.exe
      "C:\Users\Admin\AppData\Local\Temp\hromi.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hromi.exe

    Filesize

    9KB

    MD5

    b749f1bbd54df75414b420dad9d5e5e7

    SHA1

    77545c7962fc15b29438fb6fb517983139864828

    SHA256

    1a20f5221eb858829ab0ed3e4553f7d109642c4af3ea03e1a93c713bce2ea2a9

    SHA512

    802b6defe8a655338cf68cc329296704672c3afbbefc3a20f35f6c8254f92474587c4744a9556816a23c59e6e16b8e166379aa15e9d357873864ed0723c81e41