Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 02:16

General

  • Target

    ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe

  • Size

    203KB

  • MD5

    ffc03a923c804e723d521433922fa2e6

  • SHA1

    653cb9cf2e1d86c99699a86779216943f9b27b12

  • SHA256

    0752b7235736c329dcb697d89025cda71f36ea342917f4a98269d314edc8acac

  • SHA512

    0e69e89e3b3acf68ee713e8356fa84b3ed2da8545162f5d2c7a4430a2cf23d85ad766520188e0c2bec380accfad08e19d6e4410c0e4ac1947ae217467255638b

  • SSDEEP

    3072:E2GrToU/Uw0f2l0OL0KNgI09+w/JfrzSvhylcdkmDWbHwUYd1eF:wrTvcyD09+w/JnSLSRYL

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 236
      2⤵
      • Program crash
      PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\perplex.dll

    Filesize

    19KB

    MD5

    a99800442d4a59acf5ef517f47d0618c

    SHA1

    20d57740ac72534415f22da8eb10aba9f40ad54b

    SHA256

    78fa1dc90ab9d2eb038db54305b63768fb4332e867f3a6a05a30b502e658cac1

    SHA512

    9d461182cc5dad6defad4a6d21963406c72b91daf88d734e2e8ac353610b83cafcd7d395e2bd8d642a6496da98d299a5a60fa9304d5ef618b629b181f45e0c46

  • memory/780-0-0x0000000000C80000-0x0000000000CBE200-memory.dmp

    Filesize

    248KB

  • memory/780-4-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/780-5-0x0000000000C80000-0x0000000000CBE200-memory.dmp

    Filesize

    248KB

  • memory/780-8-0x0000000000C80000-0x0000000000CBE200-memory.dmp

    Filesize

    248KB