Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 03:58

General

  • Target

    fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe

  • Size

    5.3MB

  • MD5

    fb7526b9eda8e0d14e73958a1d45fbd3

  • SHA1

    8a04bd74c86f77d9a6e81af796ac6e8fff856692

  • SHA256

    2e70b4a25569d0578972289c3b0f8de1cf83a8f0c47c058ed6e685e77f3646b0

  • SHA512

    28efadfae268e5c9acdfb311a9e9ee78213bf24a8be991e48cd1ea39705a808e217a3cb6618626317c5d8678aed110b3374cbd2947905c2621f282a3f2c2a5c7

  • SSDEEP

    98304:7hLQqmoAMg29dBfGGLZbeC647NeK92f94B6RgSz+9a8Y1:7VtOTyBfVy47Nul4oRgSl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~D2BA.bat "C:\Users\Admin\AppData\Local\Temp\fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" Ver "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1220
      • C:\Windows\SysWOW64\find.exe
        Find "XP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2408
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\EPSON\PTSG\ /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2888
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKEY_LOCAL_MACHINE\SOFTWARE\EPSON\PTSG\ /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1628
      • C:\Users\Admin\AppData\Local\AdjProg.exe
        C:\Users\Admin\AppData\Local\AdjProg.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\StrGene.dll

    Filesize

    56KB

    MD5

    5e9b43ffb570bde219c3c63bf0a50f6a

    SHA1

    93269b8dd85b650a04f96ad79876b36f508ca6f3

    SHA256

    6d468ed2ef32d8f7486de26e817ff9e1e8bfac2e2ad7ff191722c2b29e0344c7

    SHA512

    8faacf4b12e02b387da689f5eaf03843b5be75ee2f8992dbced6c00f28e3bf044a5ab47f0efd09a5938929d6fa448f6ab8dc996c4daab26787ee6008a8b41713

  • C:\Users\Admin\AppData\Local\Temp\~D2BA.bat

    Filesize

    441B

    MD5

    b8f91fa3254e6ea6c77295ccf52fc53c

    SHA1

    e048dabffabad71c387c00f45dfb38620aaad2f3

    SHA256

    4092c70d0e928365b645029474ac79d85963f3aeb5a6c83ac871f5b1983a7301

    SHA512

    fa5e3d4624b8373f9d072d162c33b4d8c76cb4c208bada37fada9a61e29c1b14912d713198340e96f440c0a16add0abd99030f69bd5e416d19f037dc55db7c7b

  • C:\Users\Admin\AppData\Local\apdadrv.dll

    Filesize

    76KB

    MD5

    eaa3f442e2b4003cb9d0813f5ea9f561

    SHA1

    228bfbd60c748fcf0a97667d10c80d93256774d1

    SHA256

    057336ef31abf2573e42a72153cd320aedb07f4b816d0d9923f0b5d4219ed022

    SHA512

    ed57561d00d8a2628ec3b6922906b3e1dee9c5fbfc4d8a2ade37b147c162a05227857d42b630a0ac2c6641c2b599e0a4118b14b8524f7f6e1e600f92b7698921

  • \Users\Admin\AppData\Local\AdjProg.exe

    Filesize

    2.3MB

    MD5

    3b3263653fc9f05632a988b421cea4b9

    SHA1

    45ddc2b254bdfdcece5b3c7d3733329d854407b9

    SHA256

    25e51f8434e11206c589fe43fcfba1b236b18946e40a71390f656a23a032d7dc

    SHA512

    6596a2f35c7f20d38f3df2e2aab25e67368c4670f722eb4e12174e2f0a8d3cf55285699ef0ef5895f02b9e17d97d28ae88e9fb549969ff576a83dad4dc7181fe

  • memory/1568-15-0x0000000002340000-0x00000000025A4000-memory.dmp

    Filesize

    2.4MB

  • memory/1568-14-0x0000000002340000-0x00000000025A4000-memory.dmp

    Filesize

    2.4MB

  • memory/1568-23-0x0000000002340000-0x00000000025A4000-memory.dmp

    Filesize

    2.4MB

  • memory/1744-17-0x0000000000400000-0x0000000000664000-memory.dmp

    Filesize

    2.4MB

  • memory/1744-22-0x0000000000240000-0x000000000024F000-memory.dmp

    Filesize

    60KB

  • memory/1744-26-0x0000000000400000-0x0000000000664000-memory.dmp

    Filesize

    2.4MB

  • memory/3024-0-0x0000000000400000-0x000000000095E000-memory.dmp

    Filesize

    5.4MB

  • memory/3024-24-0x0000000000400000-0x000000000095E000-memory.dmp

    Filesize

    5.4MB