Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 05:07

General

  • Target

    09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe

  • Size

    931KB

  • MD5

    09081d5172239b8cf543ec1dba6e27db

  • SHA1

    ea1875ea4c68010760849e76c438113d51f45433

  • SHA256

    7ee2eb17b15569b926f6040aa060be3adaddf928bae3c95a1c53ab53aad12a68

  • SHA512

    8339db0c424d1dc85469317034207a604d079a9874b018620a2e7adfcb88364d416eebd3e84ca5202b6e4b8c0574d020e121c3d98f11ea14f9239f1f62fe4923

  • SSDEEP

    24576:YhzndzaI7+3XE97i0CFZUnJSLQ4WRvE/DvgipFQ3:YHaU20M+JwQ4WKW

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\SKELETON..EXE
      "C:\Windows\SKELETON..EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\windows\notepad.exe
        C:\windows\notepad.exe
        3⤵
          PID:2716
      • C:\Windows\SKELETON.EXE
        "C:\Windows\SKELETON.EXE"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SKELETON..EXE

      Filesize

      321KB

      MD5

      32b679de4b536e2dcdf726fe0431e8cc

      SHA1

      4434cdc657d4369ae34fd1d8596b3cf643743aac

      SHA256

      0ef8409b5335136fad342b69eac1632b74d1f77d5b405509b629932a0c670612

      SHA512

      684e06f906fca33c07d70478ba400b133c203558775cbb235abc575d7e937c91f30b3b703f9da96fc322e1f2b275109ac35b9228d22557068d95d6732fec05f1

    • C:\Windows\SKELETON.EXE

      Filesize

      63KB

      MD5

      a5cde4509286585c16e8def01750f804

      SHA1

      f4009335f1197032b970e28e6ecd15de65f02343

      SHA256

      fbfc0a549aa4e5197228a78a2d1c7f8cc68b04203389d7afb3fdc87c3d137751

      SHA512

      805b09362d5d65b1151cdcb68e8b54fdf99d38c26c22e08c83bca0dfe0bf66a59638414f8aa62b4cdcd939f8ecb97f093247642b89f054e4cc15e82075241049

    • memory/2656-1-0x0000000000400000-0x00000000005BE000-memory.dmp

      Filesize

      1.7MB

    • memory/2656-0-0x0000000000400000-0x00000000005BE000-memory.dmp

      Filesize

      1.7MB

    • memory/2656-16-0x0000000013150000-0x00000000131EA000-memory.dmp

      Filesize

      616KB

    • memory/2656-12-0x0000000013150000-0x00000000131EA000-memory.dmp

      Filesize

      616KB

    • memory/2656-23-0x0000000000400000-0x00000000005BE000-memory.dmp

      Filesize

      1.7MB

    • memory/2680-31-0x0000000032170000-0x0000000032199000-memory.dmp

      Filesize

      164KB

    • memory/2680-26-0x0000000032170000-0x0000000032199000-memory.dmp

      Filesize

      164KB

    • memory/2680-27-0x0000000000230000-0x0000000000232000-memory.dmp

      Filesize

      8KB

    • memory/2716-28-0x0000000013150000-0x00000000131EA000-memory.dmp

      Filesize

      616KB

    • memory/2808-19-0x0000000013150000-0x00000000131EA000-memory.dmp

      Filesize

      616KB

    • memory/2808-30-0x0000000013150000-0x00000000131EA000-memory.dmp

      Filesize

      616KB

    • memory/2808-25-0x0000000013150000-0x00000000131EA000-memory.dmp

      Filesize

      616KB