Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 03:41 UTC

General

  • Target

    043da40c797325c45d8daab7dccffc96_JaffaCakes118.exe

  • Size

    339KB

  • MD5

    043da40c797325c45d8daab7dccffc96

  • SHA1

    227604c7bcc4459a2ae0ce14560d76dafdeb82cc

  • SHA256

    670b1a91c78bbf40ce0d0e44ee07868d2454f15357920c8a458fbfa8c9cf2dfe

  • SHA512

    fa95618da5ed8526f7ec9013f80c7634037709d4d34aa4e0cdba4850435260cff10e0668c3200b67c10d62489e4c34ad3a07c3f1f0742e4e687ff4c719f60d83

  • SSDEEP

    6144:GFJ01xAL52W+LRGxoxtM4PgLkrrN4d2AP/8zbsHCwxSsLk2oad:XxAeLoxG6ygLnkIEzb5wo7m

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043da40c797325c45d8daab7dccffc96_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\043da40c797325c45d8daab7dccffc96_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\beeihaejea.exe
      C:\Users\Admin\AppData\Local\Temp\beeihaejea.exe 1,9,2,9,9,9,0,1,5,7,0 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
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727754106.txt bios get serialnumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727754106.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2800
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727754106.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727754106.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2900
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727754106.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 372
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2004

Network

  • flag-us
    DNS
    srv.desk-top-app.info
    beeihaejea.exe
    Remote address:
    8.8.8.8:53
    Request
    srv.desk-top-app.info
    IN A
    Response
No results found
  • 8.8.8.8:53
    srv.desk-top-app.info
    dns
    beeihaejea.exe
    67 B
    146 B
    1
    1

    DNS Request

    srv.desk-top-app.info

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\81727754106.txt

    Filesize

    66B

    MD5

    9025468f85256136f923096b01375964

    SHA1

    7fcd174999661594fa5f88890ffb195e9858cc52

    SHA256

    d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

    SHA512

    92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

  • C:\Users\Admin\AppData\Local\Temp\beeihaejea.exe

    Filesize

    538KB

    MD5

    4b8b6a79dcf6f6e5a4f9e0ada2bf3507

    SHA1

    aa39379dd0e23f3a6c3d131689d0e99eaf733770

    SHA256

    11b391386fb9e7c7f2dbdd9c234fcb396083b677ad77a203ee263ade2e4255f4

    SHA512

    f30426a47f250ef11e5a43e8820c5866be277392e1711da8ae49149f2e6295bb8d8945202bddb0df5db2e464eee742a78cddad27edb96c5a8a96cc49b3377062

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.