Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 10:00

General

  • Target

    12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe

  • Size

    249KB

  • MD5

    12df685fac98f94855b7accd118ff0b4

  • SHA1

    3358bac3b670cefd61e8d6b27cb67449b1269ade

  • SHA256

    dc465a16c2b5f415b4f71fbb8ebad5946b8c5e749cbd8520877deb57b3db3952

  • SHA512

    595651202c4b448b4cf76103e48b45609f56abd458e88e2f4b2daf35ec2273cc066badab507e1168fa89b052d452e419690e0a285aa37a28e2b76b12151ceedf

  • SSDEEP

    6144:PSiApUP12Q/Ilr7ZjcEucx9Osv687yWgS:6QngNVYE2Q

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\259445075.pdf"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2576
    • C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe
      2⤵
        PID:2588

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\259445075.pdf

            Filesize

            67KB

            MD5

            e739b459cb2e603e0d00af5239f53dee

            SHA1

            9e0dd72c06cdd27947c8ed91c23ab1ea4cd2fb25

            SHA256

            e01a6cb6c69b2ca73a915066c054c82ad11978be21749cb1fc96db51403a3835

            SHA512

            5f15c472dd64e890774aee4834437dec5327beb56c104bc26a6682919874c74b97ec226315297f2f7d41c8715025cb621e50985ccec1fd5b1cc0bb6aa3531a5f

          • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

            Filesize

            3KB

            MD5

            6c12e6177de9423be419f215306c928a

            SHA1

            e94305c47d2ae14b4db0b30d84d4e148c91decc8

            SHA256

            203d40582d1c70d6df7925a74a0eb8f4fa20857b3415b4bf0e8aabe50bad9e61

            SHA512

            07b9ef34fc1c4612f3dca4a7fce7cc2213d721d137e3cc8d927075e54ab8f8e508e6e3476f72df0de26498bd3f95231f29bc36ddee4e4333700e83ffdeeeb2cc

          • memory/2588-11-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/2588-13-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/2588-17-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/2588-14-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB