Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 12:21

General

  • Target

    0aa23700ae0979c9ccced0aacfe2e79a_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    0aa23700ae0979c9ccced0aacfe2e79a

  • SHA1

    ff57289d7aab7ab95721f8d99f132c2a2276d603

  • SHA256

    7cc9c6697ecde08d8d9f79252e460f780e8c2b54b1617a4e6a24ed7d0497a44a

  • SHA512

    5c4491a0f62b952fa7cadd8f14a71521968c390f38eebc8d399e22a459a04aec2b3c07fe8c74d4205c573ca87598a5e8a69616e13a5e932595be56a62a8fe8bc

  • SSDEEP

    384:E3eVES+/xwGkRKJkxTdlM61qmTTMVF9/q5F0:bGS+ZfbJkxTdO8qYoAK

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aa23700ae0979c9ccced0aacfe2e79a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0aa23700ae0979c9ccced0aacfe2e79a_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c set
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2932
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:2976
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2860
      • C:\Windows\SysWOW64\net.exe
        net start
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2648
      • C:\Windows\SysWOW64\NETSTAT.EXE
        netstat -an
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        • Suspicious use of AdjustPrivilegeToken
        PID:2752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\temp\flash.log

          Filesize

          8KB

          MD5

          4291becb29c96601d97bb8568ca0c183

          SHA1

          e0925856624f9d4ecafa494ac4b74ea28d9d6326

          SHA256

          56be6db0aa9a07620ee0741c0bf555de9a6b25237dc27299372dde3a09b8247b

          SHA512

          c0f42c0fa11bb2c279b80110af282ba62173c180d32ac3a699b5c5ff0dd6cbcdf5835b9faff9de17e429f55610723227cd160f5dea3a468f30ea1645b68265b0