Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 08:03

General

  • Target

    0eb4ecd60165c579674fbe4288b73b35_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    0eb4ecd60165c579674fbe4288b73b35

  • SHA1

    2f82451c43bf5c513112921240c3c8447738f299

  • SHA256

    e76830bee97bd3990042509b07efff82faffb8b96be45512a1afec63afeefdf2

  • SHA512

    666edd20fb452dfb241c997511f1a91f43c099582db0d5004b99d6d39b88de1859d8864e5e6a5f7627dbb79f3d22a9ddddeb42647412cc86772477a927b9ef4b

  • SSDEEP

    24576:cuUTmNOrDY84Dt/XdYzBdu+CNIK2wad3Jd8Jyn7Z7JzC8DsHoMTMtbixxH0GP+C5:cUN849wxy3UfhqYOlDMv+

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eb4ecd60165c579674fbe4288b73b35_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0eb4ecd60165c579674fbe4288b73b35_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769fc8.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769fc8.exe 259432408
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769fc8.exe

          Filesize

          2.4MB

          MD5

          aa992dadd82430c5e3f73f3d4aa3534b

          SHA1

          977c9503a7926de191bce43d1d76397aead22c9c

          SHA256

          6c6147a4aecfd521030aadf6e7c05e1bceabf0e2e24c2d9ff032eba6daf04ab6

          SHA512

          5554b8458e3d8e07bc2f4927bc3891aacc5b615f67fb3e196830de08dfaa7c96eaa763cea9d1d47c089eaf2613ec1793487f42ad9d8d7c858d7c22fbd96fb827

        • memory/2912-0-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB

        • memory/2912-9-0x0000000002860000-0x0000000002B27000-memory.dmp

          Filesize

          2.8MB

        • memory/2912-15-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB

        • memory/3028-14-0x0000000075DCD000-0x0000000075DCE000-memory.dmp

          Filesize

          4KB

        • memory/3028-10-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB

        • memory/3028-16-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB