Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 22:51

General

  • Target

    07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe

  • Size

    342KB

  • MD5

    07bf0d794610eab72b0ac85ed40aabf1

  • SHA1

    eb1badb78457daab0d03fbeefbbbcc32c05a9e05

  • SHA256

    19ba596c9afab5f63bd263ea8e14b51185005eb3bbdc47837d126ba46eeaea26

  • SHA512

    6f9d793e5a109325065d48d37eac89ad60b28e154f1e1fcfb2284abe59363bc3ea50d95a06d4d17d1ae5b19811421307a7a2ae3ea57c98d879d8c9bc7cd5204c

  • SSDEEP

    3072:WIDCldZsGbYS9fAgo3ji0IDCldZsGbYqVDrXhzlrOgkVDpBSqao9c3HwsanTdgyc:Wrv6W0rvX/eSqjc3HsTaxoq/cRzSZ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 49 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 25 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:348
      • C:\Users\Admin\AppData\Roaming\kvja.exe
        C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe -dwup
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Roaming\kvja.exe
          C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe -dwup
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Users\Admin\AppData\Roaming\kvja.exe
            C:\Users\Admin\AppData\Roaming\kvja.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1124
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1128
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1316
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2556
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1372
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2940
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:396
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:3016
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1216
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2420
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2216
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2164
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1692
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2544
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2540
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1200
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1844
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1832
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:276
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2108
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1752
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1448
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2336
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2368
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2728
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2720
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2608
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2708
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2052
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2396
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1820
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2456
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1652
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1088
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1824
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2388
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1240
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2976
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1776
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1244
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2424
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:2184
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1224
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1436
            • C:\Users\Admin\AppData\Roaming\kvja.exe
              C:\Users\Admin\AppData\Roaming\kvja.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2380
              • C:\Users\Admin\AppData\Roaming\kvja.exe
                C:\Users\Admin\AppData\Roaming\kvja.exe
                7⤵
                • Executes dropped EXE
                PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\kvja.exe

    Filesize

    342KB

    MD5

    07bf0d794610eab72b0ac85ed40aabf1

    SHA1

    eb1badb78457daab0d03fbeefbbbcc32c05a9e05

    SHA256

    19ba596c9afab5f63bd263ea8e14b51185005eb3bbdc47837d126ba46eeaea26

    SHA512

    6f9d793e5a109325065d48d37eac89ad60b28e154f1e1fcfb2284abe59363bc3ea50d95a06d4d17d1ae5b19811421307a7a2ae3ea57c98d879d8c9bc7cd5204c

  • memory/348-2-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/348-13-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/348-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/348-6-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/348-4-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/348-12-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/348-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/348-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1128-68-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2740-41-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2740-51-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2840-48-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2840-44-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2840-50-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB