Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 12:22

General

  • Target

    fc494f36e9da2224c5fba333f88116b6_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    fc494f36e9da2224c5fba333f88116b6

  • SHA1

    6c19f0f50cc9fdc55fb4744b8542aa18b19ec7ac

  • SHA256

    0672665cb1acc33d45916388c33d8f6d034ab84b265fa51e3e209d525cad30a3

  • SHA512

    d872dc6a7384b17bd0a86352df58e3d9090c20467fab520a19b3fb288c4874d1ace0f2d980e735a7a1857c5c1a1f728a9098e8218b5b95b6577545208e2873f3

  • SSDEEP

    3072:onkTEoQa7I3FadxJLzLDXKIt1Ii4lWMYer1kG5gbzGztnT7IptcwBf3KUeFbhlWW:QoQWI3MxJLzyItqWZeJ48tnutl3NeF9b

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc494f36e9da2224c5fba333f88116b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc494f36e9da2224c5fba333f88116b6_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\win53.exe
      C:\Users\Admin\AppData\Local\Temp\win53.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\apocalyps32.exe
        -bs
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\win53.exe

    Filesize

    7KB

    MD5

    d79efb472a22ad75d501317b21e66b5e

    SHA1

    24512f54884d3dda2d803457bbd3dcd513356196

    SHA256

    7255b1d1f001b9d9a5177e1f8063bcc824effe3570e6c19508babe12bb73c7d6

    SHA512

    7c5a2f516a727ddeb05f9a7c6565375debb05709ac9b95212fc748cba37a2ab81b7d727636141096e4511679ce140b07b37fdf36cfb47d8d1c8accdd24163ae5

  • memory/1752-5-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1752-11-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1752-9-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1752-10-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1752-18-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2292-0-0x0000000074AD2000-0x0000000074AD3000-memory.dmp

    Filesize

    4KB

  • memory/2292-1-0x0000000074AD0000-0x0000000075081000-memory.dmp

    Filesize

    5.7MB

  • memory/2292-2-0x0000000074AD0000-0x0000000075081000-memory.dmp

    Filesize

    5.7MB

  • memory/2292-21-0x0000000074AD0000-0x0000000075081000-memory.dmp

    Filesize

    5.7MB