Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 18:49

General

  • Target

    0c08f593e75ecaef472c99ff50b79060_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    0c08f593e75ecaef472c99ff50b79060

  • SHA1

    180247a654646e11e1be7a0eeb464741ccb49a99

  • SHA256

    9d0e2c5842df87a9dd3b51e61fc2f414871c63d434ea0706e491eddad3475e8a

  • SHA512

    f183cd72dc4dd3ee37c8c3fd1babbd5236c22e101a4693843170204b983dbaddf5a003a0cb616d6282739ac9edc7ddc9ac6f3889f539b6e7cf04babee4f5cb2d

  • SSDEEP

    49152:OFUcx88PWPOpX0SFHMZURG587n2g2uTUefKSPoiACRwsSMvGAqyGc:O+K88uPCH5go2g2VBStAvsSMTqyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c08f593e75ecaef472c99ff50b79060_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c08f593e75ecaef472c99ff50b79060_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\9991.tmp
      "C:\Users\Admin\AppData\Local\Temp\9991.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0c08f593e75ecaef472c99ff50b79060_JaffaCakes118.exe D12DEE552E0DEC419E478BF9760A19C9E44061A4956E8B54A1773946EA89E0624558F1B5F32879BD888D4759E9BFEB6E155E0B6C984C48B0C027165696670FEB
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0c08f593e75ecaef472c99ff50b79060_JaffaCakes118.docx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0c08f593e75ecaef472c99ff50b79060_JaffaCakes118.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\9991.tmp

    Filesize

    2.0MB

    MD5

    15d36b9be3a1bd556605d8456cdfc26c

    SHA1

    a9ec8dce483440e6907f0d579e62bd5d0e1b6adb

    SHA256

    b8292b451301e1c3fe125e0e7750f15a7665f5ee6912b32ac933d1fb076c8625

    SHA512

    b25c968e8b701107920f0854c237377f50d15f28dde0a8362b23062284c3a1c162ad0529b188b62eb42c0cc8bbfef986c73c7ae72724d0b739d0a91679504946

  • memory/1364-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2268-9-0x000000002FE41000-0x000000002FE42000-memory.dmp

    Filesize

    4KB

  • memory/2268-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2268-11-0x00000000713DD000-0x00000000713E8000-memory.dmp

    Filesize

    44KB

  • memory/2388-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB