Analysis

  • max time kernel
    92s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 03:02

General

  • Target

    088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe

  • Size

    707KB

  • MD5

    088f1bece6e88c77d098f62f99d89bb9

  • SHA1

    51567c9ca406fab6f226b6a209f80c6de85cffcf

  • SHA256

    1ac51534108d6e15ec907dbe1abd95965ec46df675e941f71310b6e2d83fa4cc

  • SHA512

    fd52f2f37c48cb3b60ceb961778fa7b9c84ced01284c1e219637f04922561720c10deded4732eb41716b3981825c10270f6c2623dedb547ac1a4c95f2985bd5c

  • SSDEEP

    12288:oQn4AB4iq43L1xFzOfAGUl0gG31qaIp+vlJoKe/ZFEFV4EAgD1y6+B9kBR:L4ABz1aAVGFbdHo3FEz4rgD1W9kn

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3384
        • C:\Users\Admin\AppData\Local\Temp\file2.exe
          C:\Users\Admin\AppData\Local\Temp\file2.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4928
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 476
            4⤵
            • Program crash
            PID:1972
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4928 -ip 4928
      1⤵
        PID:4964

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\file2.exe

        Filesize

        256KB

        MD5

        d8b430edfad4e2df5918e5e22b479265

        SHA1

        300047a4a4760cc0b5aca5471af0e8fa5fa78cc3

        SHA256

        a39eb96feccdccb98661924182220906b77af107a78147b7777893757917914d

        SHA512

        38aa290232060ea6f288380c8ce951320fa819e1f3c7270d0266399cd822fae226b1583e1c2a4d278b46632a4ef7cf74a1e64838944851416c56a1daeaef6387

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        379KB

        MD5

        a623b39e454c2350a23eedf2a98cda40

        SHA1

        dd94807c99fdb982118059001d57f41c8eb3126d

        SHA256

        42bc65641067d2b8c6351eed0b911a7e78f3591bb84b9f4dc5bcbd5d891158da

        SHA512

        7522ccb274758881f0eb0ffabb939108c939d2504cd4be2954e3fef57a33543bc85c37c894eea16b212956825613e9ebb4432c34597c74455b70f1853b2698b4

      • memory/3428-20-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

        Filesize

        4KB

      • memory/3428-22-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

        Filesize

        24KB

      • memory/3740-13-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/3740-18-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/3740-17-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/3740-26-0x0000000010000000-0x0000000010011000-memory.dmp

        Filesize

        68KB