Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 01:36

General

  • Target

    03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe

  • Size

    635KB

  • MD5

    03e9df0ca01c4d83a30ebfeac6e8063b

  • SHA1

    be6f9a7d6252ca87f4fd8529c826648c2a1983ca

  • SHA256

    0aa7bbd7fc2a2487cdb7b1c4630edc7de831f889eec8cf389a7ef192cb4e801a

  • SHA512

    5b9bef1ed8c8f583604a43b8ee3f47ef9471bebf2dcbdd65a2bfcfd90bd96d7c6233c64a369065d9be60fc46a2f9a428ea8037392dae954cd4d7bcda19b67ff2

  • SSDEEP

    12288:AAXozHlCHUa8V53DrvuscsF3Z4mxxrxPCjcngNPF:5nH3s3DrvuwQmX4NPF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2924
  • C:\Windows\windows.exe
    C:\Windows\windows.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\uninstal.bat

    Filesize

    218B

    MD5

    14effe4df1021329d04e64cc9aae75e2

    SHA1

    a99b81deabbc649b897dfabfae569e7b765c8b9c

    SHA256

    0291ab4667d7c4901e6554365dac6538f8568655304fe603ab74a991b9447e80

    SHA512

    abd36e5e96812370bc30b8aec636fc9230f4ca2ee96abc6fdc4a39fde8dc312e2a4d041fd903615440b9ef2b4864ad46094febde41705204cd2906d874cd2c54

  • C:\Windows\windows.exe

    Filesize

    635KB

    MD5

    03e9df0ca01c4d83a30ebfeac6e8063b

    SHA1

    be6f9a7d6252ca87f4fd8529c826648c2a1983ca

    SHA256

    0aa7bbd7fc2a2487cdb7b1c4630edc7de831f889eec8cf389a7ef192cb4e801a

    SHA512

    5b9bef1ed8c8f583604a43b8ee3f47ef9471bebf2dcbdd65a2bfcfd90bd96d7c6233c64a369065d9be60fc46a2f9a428ea8037392dae954cd4d7bcda19b67ff2

  • memory/1728-7-0x0000000001F20000-0x0000000001F21000-memory.dmp

    Filesize

    4KB

  • memory/1728-27-0x0000000001D70000-0x0000000001DC4000-memory.dmp

    Filesize

    336KB

  • memory/1728-17-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/1728-16-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/1728-15-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1728-14-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1728-13-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/1728-12-0x0000000003280000-0x0000000003284000-memory.dmp

    Filesize

    16KB

  • memory/1728-11-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/1728-10-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

    Filesize

    4KB

  • memory/1728-9-0x0000000001F40000-0x0000000001F41000-memory.dmp

    Filesize

    4KB

  • memory/1728-8-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB

  • memory/1728-18-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/1728-1-0x0000000001D70000-0x0000000001DC4000-memory.dmp

    Filesize

    336KB

  • memory/1728-19-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1728-4-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/1728-3-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

    Filesize

    4KB

  • memory/1728-2-0x0000000001F00000-0x0000000001F01000-memory.dmp

    Filesize

    4KB

  • memory/1728-5-0x0000000000950000-0x0000000000951000-memory.dmp

    Filesize

    4KB

  • memory/1728-0-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-24-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-6-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/2540-25-0x0000000000350000-0x00000000003A4000-memory.dmp

    Filesize

    336KB

  • memory/2540-23-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2540-37-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2540-38-0x0000000000350000-0x00000000003A4000-memory.dmp

    Filesize

    336KB