Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 07:18

General

  • Target

    0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    0e8bf75e3f8b2c85945c58eeb7f1afad

  • SHA1

    b0547ff2044626f297d98438c687a1df40b1d41e

  • SHA256

    6bf547f17002fd30de282700abf494e7e0766f3ab09918c5c919c728c1cd62ef

  • SHA512

    9af55554215a595ef8a8dbb614af73afc2b4056d979ec1ce5956b5a9124e75e36353bd7fde94018729e70bfa9bcc95a5432af4dd02de84f561f0efa720b1f17f

  • SSDEEP

    1536:4bl0zZ/iCw59di8LBFK7DIzfdC8l9C5xh3x:00zZqhdimwUs8lM5xz

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Print Processors
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\System32\spool\prtprocs\x64\xs79sK7.dll

    Filesize

    9KB

    MD5

    ac5e98d10150efec0ccc719df7a18be9

    SHA1

    e5e61e2043b2aab2a7bdc28e437508060f786664

    SHA256

    cc6077ca6df1d902c4066a567fdd31a93d4fe9bd1d574c534b030533312ba40f

    SHA512

    d2e544923fa19def5fea336b292f6788abdfcbe9a70f041b334c09ca745715ac860dfc639e20cd1cc75f207b2ced08559efae93d4065e2909f0f621a069af1e0

  • memory/2124-1-0x00000000772B0000-0x00000000772B1000-memory.dmp

    Filesize

    4KB

  • memory/2124-0-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2124-5-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB