Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 03:17

General

  • Target

    f99c3ca8bafccae696a70eceffa98dd3_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    f99c3ca8bafccae696a70eceffa98dd3

  • SHA1

    c79b59276068febec1aa579854e883cd723c007f

  • SHA256

    289d800ba4ef98a1af9c9752d18e4afc1b690b3e5df421b200fbc01c049212be

  • SHA512

    d192f8bcedc9d3712a233ed1cac903b49ffdba3358b797e6ede5c9aaba6857fb1cd1d19574bf3c4780514bd0131cc046bc3101228c0c64cd498431ec02919815

  • SSDEEP

    3072:0DwUrtu45okZxJKlSVcYXFr9pdp2zAkNjtWB/mGeiF8TI5P6x+WJQo:Mpt7OlaXFJpdpofjt4/LaIoJQ

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f99c3ca8bafccae696a70eceffa98dd3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f99c3ca8bafccae696a70eceffa98dd3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Recycle.Bin\B6232F3A0C5.exe
      "C:\Recycle.Bin\B6232F3A0C5.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\jwc732.exe
        "C:\Users\Admin\AppData\Local\Temp\jwc732.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycle.Bin\46408F17B5F055A

    Filesize

    8KB

    MD5

    d49ae6fcd4b6cd63aec285d5e5bc34a2

    SHA1

    2fff7112f737d8e7a3c63ef188cd88649259ae4c

    SHA256

    a9abd3feffbcc75443dcba78eeb90f008e732b340d1a9e5a9e69de101e377f73

    SHA512

    e7247287157641074257021809c028f6887fe8e75471f00c54e547a78401b9e54c4a302309149437f6a8aef0e584be81ae606b5a612dad71012268c6d042acd3

  • C:\Recycle.Bin\B6232F3A0C5.exe

    Filesize

    188KB

    MD5

    f99c3ca8bafccae696a70eceffa98dd3

    SHA1

    c79b59276068febec1aa579854e883cd723c007f

    SHA256

    289d800ba4ef98a1af9c9752d18e4afc1b690b3e5df421b200fbc01c049212be

    SHA512

    d192f8bcedc9d3712a233ed1cac903b49ffdba3358b797e6ede5c9aaba6857fb1cd1d19574bf3c4780514bd0131cc046bc3101228c0c64cd498431ec02919815

  • \Users\Admin\AppData\Local\Temp\jwc732.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • memory/2372-26-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2372-22-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2372-18-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2372-19-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2372-21-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2468-88-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-93-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-20-0x0000000002040000-0x00000000020D1000-memory.dmp

    Filesize

    580KB

  • memory/2468-5-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2468-6-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2468-4-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2468-1-0x0000000000484000-0x0000000000488000-memory.dmp

    Filesize

    16KB

  • memory/2468-2-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2468-100-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-0-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2468-48-0x0000000000484000-0x0000000000488000-memory.dmp

    Filesize

    16KB

  • memory/2468-89-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-90-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-91-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-92-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-10-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2468-94-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-95-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-96-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-97-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-98-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-99-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-101-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-102-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-87-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2468-83-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2468-86-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2468-82-0x0000000077C4F000-0x0000000077C51000-memory.dmp

    Filesize

    8KB

  • memory/2468-3-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2832-62-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-66-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-50-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2832-49-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/2832-67-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-46-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-45-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/2832-44-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-43-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-77-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-41-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-40-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-39-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-33-0x00000000003A0000-0x00000000003EE000-memory.dmp

    Filesize

    312KB

  • memory/2832-78-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-80-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-68-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-76-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-69-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-70-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-75-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-71-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-73-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-74-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-72-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-58-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-59-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-60-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-61-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-63-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-65-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-64-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2832-57-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB