Analysis

  • max time kernel
    146s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 12:14

General

  • Target

    0a9a0027365b7108f218687998b7ed71_JaffaCakes118.exe

  • Size

    431KB

  • MD5

    0a9a0027365b7108f218687998b7ed71

  • SHA1

    e820d45738c2fdd259a164e565c48613f3f29445

  • SHA256

    e782a0272da59494d8fd43563d78c2d8140d8c3d5e24ea7413fe723a137087d4

  • SHA512

    fd04128d968f433c055682bc600cc44c9e11a7df24bbe5e4f9e5f86edba1fa5349b2dedb3deb1ac5939a15f4fb387e71da180d8d94cb1abba0ae753d475d585e

  • SSDEEP

    12288:dMKWY43DziwNKvzSJRg4wr4/ihGrd6Me9Tofv7+s+OqL:dMKWT2wKOQ4wrOPrgMsyviz

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a9a0027365b7108f218687998b7ed71_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a9a0027365b7108f218687998b7ed71_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\HwKwxhbSJo.exe
      "C:\Users\Admin\AppData\Local\Temp\HwKwxhbSJo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\AGmbYFRvSp.dll

    Filesize

    384KB

    MD5

    386df4915a31cf9c3abc3a28553cb71b

    SHA1

    28ec4cb31a405fea3759925954e2221c64f95f5e

    SHA256

    5985e99f1ac745a2c9f1b4dc88a59756ad4b1b275fd3e081d6e541542347e8a6

    SHA512

    8b8ce6882665b5a5fbae61e64642f9eb2fab776216be5577414d38b968d41d16eacc897308e8c63c3a545818a11d9678621d810c69d3e05c871adbae904d618d

  • \Users\Admin\AppData\Local\Temp\HwKwxhbSJo.exe

    Filesize

    431KB

    MD5

    0a9a0027365b7108f218687998b7ed71

    SHA1

    e820d45738c2fdd259a164e565c48613f3f29445

    SHA256

    e782a0272da59494d8fd43563d78c2d8140d8c3d5e24ea7413fe723a137087d4

    SHA512

    fd04128d968f433c055682bc600cc44c9e11a7df24bbe5e4f9e5f86edba1fa5349b2dedb3deb1ac5939a15f4fb387e71da180d8d94cb1abba0ae753d475d585e

  • memory/2712-0-0x00000000002E0000-0x0000000000349000-memory.dmp

    Filesize

    420KB

  • memory/2712-1-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/2712-29-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/2712-31-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/2712-30-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2716-11-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2716-15-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2716-33-0x00000000748B0000-0x00000000749B2000-memory.dmp

    Filesize

    1.0MB

  • memory/2716-45-0x00000000748B0000-0x00000000749B2000-memory.dmp

    Filesize

    1.0MB