Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 09:47

General

  • Target

    00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    00b3cc65cadd79766ce2351380458734

  • SHA1

    94f84a3fa9475baaf4e2738791b39d1aa06c93e6

  • SHA256

    f6e5fa25486fceb905f3ddde4f9221aebbba7545d2f9b302bff36e1897f73ee8

  • SHA512

    a9f70bcec9e38ff7d43f1ba1ee4026925376db5978df59f8db2f0ea3a5e11cda629db4664efd4391969938bcb18cbbd28e40396f8bce812ba214d10e576caa9b

  • SSDEEP

    3072:yJ3+HVRKw27/zdG/1lOpb3WF+ojPu5PkPxQiHQFh26WY7/HAgb:yJeUhm18bs7PTPqiHU2KHP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\WINDOWS\SysWOW64\Lsas.exe
      C:\WINDOWS\system32\Lsas.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\win23.txt

          Filesize

          27B

          MD5

          709191d3408d179db0aff8bbbca7e249

          SHA1

          407ef9fff2bbeb2b85738a39c8bbbaa2dcf9b2fd

          SHA256

          ed8f9de65ce3dc77975224b9d88a38dc6f211b6d9bd9ac1659260f92232fc109

          SHA512

          f7b4087507e3fcf834da069cb97db034be549af8d78874166e990a164f7f9a39baa6492906ac56c3c23d0e2a11d8a2634e1c455ac2facded7c8011244f1e1529

        • \Windows\SysWOW64\Lsas.exe

          Filesize

          130KB

          MD5

          00b3cc65cadd79766ce2351380458734

          SHA1

          94f84a3fa9475baaf4e2738791b39d1aa06c93e6

          SHA256

          f6e5fa25486fceb905f3ddde4f9221aebbba7545d2f9b302bff36e1897f73ee8

          SHA512

          a9f70bcec9e38ff7d43f1ba1ee4026925376db5978df59f8db2f0ea3a5e11cda629db4664efd4391969938bcb18cbbd28e40396f8bce812ba214d10e576caa9b

        • memory/1020-24-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1020-37-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1020-49-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1020-61-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1020-72-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1020-84-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1020-96-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/2128-0-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/2128-12-0x00000000028D0000-0x0000000002955000-memory.dmp

          Filesize

          532KB

        • memory/2128-19-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB