Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 00:13

General

  • Target

    03b9b86e7a1126f836fcf6601f4e2f14_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    03b9b86e7a1126f836fcf6601f4e2f14

  • SHA1

    c61ea054ab10bd3a6d978023976a3dbb794dff75

  • SHA256

    d8f85ba5d8738eb1bc89b48b04636ad87e3ea0a72779f1794ffcd9b5dc62f0e4

  • SHA512

    76a476d6e72bd367f8490abf64450947484e8358cfa318d214adcba9a0e421bc4631a2a7b88f30c66dd2e68b5a0cd64a2a0d88fd6143a2f31dbfab8994e2be46

  • SSDEEP

    6144:zOUj+bBvkSHQeZdz+654mECvf9pd7ngyqhY:zOUj+bBDHLZdK6amECNVcY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03b9b86e7a1126f836fcf6601f4e2f14_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03b9b86e7a1126f836fcf6601f4e2f14_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Vhp..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Vhp..bat

    Filesize

    238B

    MD5

    c23e4362fd87116fec1515486c7f636d

    SHA1

    d98116e57e28bb4a72a3132376e6bfea3114b27e

    SHA256

    682756f5fde079fb110d30647c2b41aa1a5046c76e86c78d9a0c769d491e2eb2

    SHA512

    4e97657b319cc20d0d2efdedfebb3a8e43e4a31c0f8e4a35a2abbd9c9602a70edaa54337b729487f2c98fe9f2062ea32f0fe556023713bad805641a7a6c2a412

  • memory/2920-0-0x0000000000250000-0x000000000026A000-memory.dmp

    Filesize

    104KB

  • memory/2920-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2920-3-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB