Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 17:29

General

  • Target

    f681a7dd40872dc0e8f861e50321fd0e_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    f681a7dd40872dc0e8f861e50321fd0e

  • SHA1

    4840a52590ea04e03f1e0af5d2d01185c42a9112

  • SHA256

    171e26fa2f5b5480ad9beaea154e5edc4ac63cbb57b780eb2395ba4dab4ddc95

  • SHA512

    5aba653a3e34e79be43a8da6067098fc8ee336b585e52478f66eabf3f5f1b6b6a8c4a9f81b79102a45b03bedb1061a3cc1d2d3ce4ba356dc72d3e584aff99544

  • SSDEEP

    384:n+x69znFy+97GCwKSAURiMnPBS0BZHETf8YBynFCT1a:nk6JnE+lf/SzS6H28/nFV

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f681a7dd40872dc0e8f861e50321fd0e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f681a7dd40872dc0e8f861e50321fd0e_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\316C.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\316C.tmp.bat

          Filesize

          207B

          MD5

          a82d0a715d6e441eb8ac5faa513c443e

          SHA1

          d54d8038dd36d26331ad4ead6aee7f2af805be74

          SHA256

          80b6a24676dccfc535656fa444169e4e4a041662ad6832340eaf1094e5bd9d96

          SHA512

          5dceb294f7dd54dd2bde6b93dc4121f1ffd295b1469038503099c793f510105bd47205b12ac696c3b5de2f7d3ee42d20de72101abd69cb061259b50031a6f754

        • C:\Windows\SysWOW64\dpvvoxmh.tmp

          Filesize

          1011KB

          MD5

          d429df875c6e6fb58b698f5bd4b8ce13

          SHA1

          262e7c931705fb93b5759cb683781d2d046ab8ab

          SHA256

          b43426b9553085085dd8c66cab9f638a509c1716a784374f91a208fbf9485bb9

          SHA512

          c2b69b32757111fac43f7b34c386bfa1b07bbf2d8b66e53db1cd6bffa5387b68aa6cd8df99d0f0b11d90a6471646175581999f66bc193cf2fb873bc6ecb3dace

        • memory/2052-8-0x0000000020000000-0x000000002000A000-memory.dmp

          Filesize

          40KB

        • memory/2052-17-0x0000000020000000-0x000000002000A000-memory.dmp

          Filesize

          40KB