Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 13:08

General

  • Target

    017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    017df3e1fbf3077b4ecc3505f978fc29

  • SHA1

    00a273aaa0354b8240225d6d754cb90d087e3a28

  • SHA256

    d40c6e1a46ec1bf164b884997375f0ba3d0e19032995b6b0f7871435157547aa

  • SHA512

    2f8749281fdd965be405a20909a5c8f85cb2b3b1b8feaa6db1c6bf47284ca82a4d55e074c253d889446160f021683fe0786a34f7714dd57e0c5abc378c015ce4

  • SSDEEP

    1536:LA1rTrb0ZanRg/XdcUkUTKXSSeqJFaoVLGX1Gw4AfZksczp2038:LAd3gcnStcZU2RnJozdpu3zpM

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mlj..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Mlj..bat

    Filesize

    238B

    MD5

    8623107e0d264c29304e03b2446c6ec5

    SHA1

    da1cb5d6065253f2d6ac32ca89158fe770bc3b6c

    SHA256

    6fc3f057eaee05f0a9e7bd158c216d92bededa31c717860eaf24acb31f850aec

    SHA512

    bf27d7d986d469cb028e6c7bd47dee53febe97da10ccfe782979ce17e786041db2350125c92c6ccd44ca625b1f7c3bd74ce2fa2de67fcd9a528b3b8d373c3c46

  • memory/1744-0-0x0000000000230000-0x0000000000238000-memory.dmp

    Filesize

    32KB

  • memory/1744-1-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1744-3-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB