Analysis

  • max time kernel
    131s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 08:13 UTC

General

  • Target

    09b766597c897a0eb8ed58cca3bbed34_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    09b766597c897a0eb8ed58cca3bbed34

  • SHA1

    6135a1013963463c62b1b361be40704bcc037176

  • SHA256

    54b0f53f5c6de527ce92be03467dde8bd4a7694c39c1290350121f4d8a2447c5

  • SHA512

    896c7713588682def338a78dc2730ffc4c9a44190499c397c51f3ca5a3dcab05976e84dc1fddde781139ffa9e8dfdbf8a2db0d308ae3221c7661afdbce0ad8ca

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYyO00:hDXWipuE+K3/SSHgxmyOH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09b766597c897a0eb8ed58cca3bbed34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09b766597c897a0eb8ed58cca3bbed34_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\DEME743.exe
      "C:\Users\Admin\AppData\Local\Temp\DEME743.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\DEM3C74.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM3C74.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Users\Admin\AppData\Local\Temp\DEM91E3.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM91E3.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Users\Admin\AppData\Local\Temp\DEME6E6.exe
            "C:\Users\Admin\AppData\Local\Temp\DEME6E6.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:332
            • C:\Users\Admin\AppData\Local\Temp\DEM3C07.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM3C07.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2156
              • C:\Users\Admin\AppData\Local\Temp\DEM91B5.exe
                "C:\Users\Admin\AppData\Local\Temp\DEM91B5.exe"
                7⤵
                • Executes dropped EXE
                PID:1292

Network

    No results found
  • 10.180.0.115:1337
    09b766597c897a0eb8ed58cca3bbed34_JaffaCakes118.exe
    152 B
    3
  • 10.180.0.115:1337
    DEME743.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM3C74.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM91E3.exe
    152 B
    3
  • 10.180.0.115:1337
    DEME6E6.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM3C07.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM91B5.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM3C74.exe

    Filesize

    14KB

    MD5

    b73fad3d7517d981949f5268dacd1104

    SHA1

    eb8e35e4c95bb4d670a5e927381beb4eb1da1446

    SHA256

    792f27740cd722d99c3cd9743dcc569962dea940f0c3925159f00ece6c5fc8b8

    SHA512

    ddcad4bbdeff9d2728c898432e816424ae7776e57e03a1c9e0ea66e57dffe0daca0da1983c9608c5bf33f3c0482d667a9b6bf5913e9d76c35f44c69904e8941a

  • C:\Users\Admin\AppData\Local\Temp\DEM91E3.exe

    Filesize

    14KB

    MD5

    7464ac311990706d5141c00e071c102e

    SHA1

    47a4ca98d11cdfbcd99d42349edc98ce7f042a6d

    SHA256

    f572a313ffc8b83d4587813b0863664527d89630bb6805e974bae2badb08fa5c

    SHA512

    975144c71f72d1983a2fa88b5ffd45e93063961effd94c9e60acd2bcef4e91591a5544d46cd7c2f41591f237955f98c2d1342ae8b074d1ae567fc607ad4b88e4

  • \Users\Admin\AppData\Local\Temp\DEM3C07.exe

    Filesize

    14KB

    MD5

    6c46dacfee07089ffce9942f5062e0bb

    SHA1

    48bf4649b6c60c54eb0e54a68ef88ae747423225

    SHA256

    2dcd90a6bb5eea6c80d4125f0d92e9de5be543e062a2ec72db0c72ed9c6641a3

    SHA512

    f99f396e180266def12478dd75c9ee02fc976733fbeecf31feaaca4bd8f94d11d7ef33b9804184b09ae210ac33d17a640528e596df9055b5d43dadae8be264cc

  • \Users\Admin\AppData\Local\Temp\DEM91B5.exe

    Filesize

    14KB

    MD5

    ec6009d41866997bf1eb62383cae41b7

    SHA1

    44870c6e2293c6af21adf1a1539d2ebccf7989cb

    SHA256

    060764a672d2ac75ef25f6df7c532c6eb3bda33161996dbfed65c93341e81e7e

    SHA512

    b028d8106638d706770192197e98bb11ba5af951c1a2f4da3546303d7dde8dac54b9c32263d618befa35ce475767b3a73e1316bb2fa4dde8446cb9e97c32af32

  • \Users\Admin\AppData\Local\Temp\DEME6E6.exe

    Filesize

    14KB

    MD5

    92393ae9082c255fddeb86ad158d3ff1

    SHA1

    0bd81110cb5c609997b15a939b4b3ca69508ffb3

    SHA256

    0d5df54a308d3e123ebe9b4f1ae41b4ddbcaa78d1d5a709f624c9ed3770ea588

    SHA512

    79073a6043fae22499ac640e150d5cdec294b38b9406dad688c4a557d0e4d1bf9a47fb050e9c9e0b78177e1abe67aeeca6ef54b96ac98ee80b34f7cbba30d533

  • \Users\Admin\AppData\Local\Temp\DEME743.exe

    Filesize

    14KB

    MD5

    533241460820cbb57949280a299deda4

    SHA1

    3000db2d033049b69ad34fa44255849515d7eb20

    SHA256

    dc31a07bb81637a0bfa911d936171d408cf69eae0406dae00b2b05391dece36d

    SHA512

    259e4c541aff12bc86c49fdb631f78235e861d385db4706d5afe5053f229eda568a6b8561e28e30758d68f8500cf2f5974a923091a25c54648a2ff4cc91156a0

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.