Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 03:31

General

  • Target

    ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe

  • Size

    985KB

  • MD5

    ffdf7f7dbeecbeb16757be9807b80987

  • SHA1

    24a0bead7b9376fcf7293d7d5df60a7a0f27db2a

  • SHA256

    d0f9ad4ef39bb2972ee00b6b7ba9dd94d192b3b2cbfc26cc89d0e9e562ae666c

  • SHA512

    5137e3754ee37a251270fbe89a2e66192e1a9ef40435a473c11ca473dacea8a46de314ce0640313cfe9e687d64343442186afb842a55231efe71dd098a669953

  • SSDEEP

    12288:NieDHBRs0GXQCxeW5xH5lWGutCjHvascYCUbigdmAN8MxkBGKWrU43xY/e/y4P+g:jgpeW/VrJiZWYigAZJ0rY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
        PID:2512
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Windows\SysWOW64\winupdate.exe
          "C:\Windows\System32\winupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3176
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Windows\System32\melt.bat" "
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2532

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\melt.bat

            Filesize

            97B

            MD5

            5b722b22b19fbf4eb90e8c068ecbb379

            SHA1

            39d644cad70f6398f39ebda54bce6f3b49fc685b

            SHA256

            5f1546795b73db8c1877af7256f5a3735b001333a16428188716fbb89f6c15d1

            SHA512

            ba8915515fc2d17fb3ad91ce360866c3040fa61cd467c6df7b54b0debb5629d187782347aa96edaed584039f060387a1cb1151f5100ffdd8a9db8ae715348cd1

          • C:\Windows\SysWOW64\winupdate.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • memory/3184-3-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/3184-4-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/3184-6-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/3184-21-0x0000000000470000-0x0000000000539000-memory.dmp

            Filesize

            804KB

          • memory/3184-22-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/3940-0-0x0000000074952000-0x0000000074953000-memory.dmp

            Filesize

            4KB

          • memory/3940-1-0x0000000074950000-0x0000000074F01000-memory.dmp

            Filesize

            5.7MB

          • memory/3940-2-0x0000000074950000-0x0000000074F01000-memory.dmp

            Filesize

            5.7MB

          • memory/3940-7-0x0000000074950000-0x0000000074F01000-memory.dmp

            Filesize

            5.7MB