Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 23:42

General

  • Target

    fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe

  • Size

    180KB

  • MD5

    fd600ef23834b3ceb20c1200b9ba94ba

  • SHA1

    60b68644c61210b7b53ce841478868ed8abda6d8

  • SHA256

    18216d83a83de5405a136f32d79d9906b85925271753984a5a824db6cb8283d6

  • SHA512

    796b920710e7c95d310bc453419665ad95ffa54c3e1675c2c191ace8368f3c8af934268661eb341f0d028849a56d717a83b5d428f095383bbb620e7349de7d2c

  • SSDEEP

    3072://vGHqJLx6B/CRLdhHt5GWp1icKAArDZz4N9GhbkrNEk47K0qZy:nWqA/eRBp0yN90QE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fia.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fia.exe
      2⤵
      • Executes dropped EXE
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stub.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stub.EXE
      2⤵
      • Executes dropped EXE
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fia.exe

    Filesize

    18KB

    MD5

    8ac20ab22be723af1b2b69dc5f5c9f16

    SHA1

    e6724138692f50042e40a14c735d070e98fac0ea

    SHA256

    f948ed02a1dcac31f95ed2ce68fd424569965c330f04e865b8cc4c0d24b14350

    SHA512

    ca09297db98b81b85ae9f1813ffbb67e75848748c8d32873a316ab8c086131acdcafe1dda265edcf780e07fc9173c68c5b0c6a61855f0e5e410e3a68d351b8c4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\stub.EXE

    Filesize

    17KB

    MD5

    ab40d0cbeccd167f369c3e5278ee5519

    SHA1

    f9bb18cf69f3c504192eed63cf234587d15436cd

    SHA256

    faee731c74715b6a3e948d8e5b553e7da5d8a9de161179030f30583ae1862f01

    SHA512

    9632454962fde1bf5b74d54a3c868ecba3975ef97a7ba14f3f1f447c5a1d8b8dc1a2c46e4406a075e3ad8a66cd550433c12c81a3d61bac6b6b7f0c2300943ea7

  • memory/2732-8-0x000007FEF64EE000-0x000007FEF64EF000-memory.dmp

    Filesize

    4KB

  • memory/2732-9-0x000007FEF6230000-0x000007FEF6BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2732-10-0x000007FEF6230000-0x000007FEF6BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2732-11-0x000007FEF6230000-0x000007FEF6BCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2732-12-0x000007FEF6230000-0x000007FEF6BCD000-memory.dmp

    Filesize

    9.6MB