Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 08:31

General

  • Target

    050d0dbce66c8e0b7fc83d78e6690d88_JaffaCakes118.exe

  • Size

    69KB

  • MD5

    050d0dbce66c8e0b7fc83d78e6690d88

  • SHA1

    6c1122f23d76ef4e6009eb10c5a9ca18a51ec1c4

  • SHA256

    d7dbcc3a2d03901ea9b2b5cb2fc7ec6cb687153d048117a5137784f73af3cf7b

  • SHA512

    acc2633fe9c98f30f39342b9b7d8da5dde48cacc4164b06c5457ed3375f5140afb96895649283dde787902acfcbf18f53cad52d336f490b87a107f10dbc6f637

  • SSDEEP

    1536:vSN0PUplkZR7ya3RQu5Ot8v7AHTbFBNyqEXHvl4yp4zkDjPyj2nouy8:vS6Yl6Rua3RQuQAAHTbFHyqod4iDjaiZ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\050d0dbce66c8e0b7fc83d78e6690d88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\050d0dbce66c8e0b7fc83d78e6690d88_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Roaming\netprotocol.exe
      C:\Users\Admin\AppData\Roaming\netprotocol.exe
      2⤵
      • Executes dropped EXE
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    69KB

    MD5

    ed1145c518458750b685e126f96d7834

    SHA1

    637fb57fd777a176528b140c42b1f5eb67924c45

    SHA256

    90ac8734e6c6ecc69e59c0e2eaf2a35e3e583cb5aa54ca5fbf77ba7f70835ae8

    SHA512

    717a16e16e9ba9ae78ed39e967fbd65d094405714efef930d067f50f57536db07cf3082ad8c8b2d06795896c9a2169ed3ef35a2861d1404293a5cce2a3172d30

  • memory/1900-0-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1900-3-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1900-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1900-6-0x0000000000260000-0x00000000002B5000-memory.dmp

    Filesize

    340KB

  • memory/1900-14-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2164-12-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2164-13-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/2164-15-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB