Analysis

  • max time kernel
    41s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 21:22

General

  • Target

    034c8a5203d8613b6e6f613080e3e34f_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    034c8a5203d8613b6e6f613080e3e34f

  • SHA1

    4f39fb7d601ab198910854d61344002f29cdf652

  • SHA256

    4da01fd8979053bb9e1834934af4e5b370c8b2a1625ebb3ed6fff9d67a794c79

  • SHA512

    48901b3fdc577ee429f5b7961b6d81379a1dc80c059cd1af87905ebe4caa59fb555d05ce28656db2a1f2b08501e3e5af0324819ae7aed59e5afa0b2e02a48957

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\034c8a5203d8613b6e6f613080e3e34f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\034c8a5203d8613b6e6f613080e3e34f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$$$$$.bat

    Filesize

    228B

    MD5

    c5a5dc72912191da47fdb24d1f7ac6a6

    SHA1

    a564b61b2b2b500a991e49253e20499e6298d993

    SHA256

    104240c6cc9b0f87aecbb3cb91de226cfdec20a7a45b122540ba0ffce9e6e153

    SHA512

    0e8fbae0c6d4decda551fc015ef64965d09af7d1c9a36646a6eb719cd7828bb70303b985a35592186de472f32d8e6ac15b2b295c29e4a596377491c943e32495

  • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

    Filesize

    2.1MB

    MD5

    034c8a5203d8613b6e6f613080e3e34f

    SHA1

    4f39fb7d601ab198910854d61344002f29cdf652

    SHA256

    4da01fd8979053bb9e1834934af4e5b370c8b2a1625ebb3ed6fff9d67a794c79

    SHA512

    48901b3fdc577ee429f5b7961b6d81379a1dc80c059cd1af87905ebe4caa59fb555d05ce28656db2a1f2b08501e3e5af0324819ae7aed59e5afa0b2e02a48957

  • memory/1972-3-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1972-426-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1972-826-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB