Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 13:12

General

  • Target

    137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe

  • Size

    134KB

  • MD5

    137d0d610541ee95dda97be7861ad5fc

  • SHA1

    42e7c5b0c07e1acc6feb983f68b13448dd1a7c44

  • SHA256

    dc43c59e0b8abb1af31ad08e334d1cdfe8a57e2fe1e73779786cb76616afe4b0

  • SHA512

    3bd2720982207872dfe57787caac2b3f1dac5d4c9088e89d031f49831b03927cae98d888731968b9bd660c3ca9c90f090b6beccd4bf7d37f883eb4281a08950e

  • SSDEEP

    3072:lL1SE8b1R1Fw6qPrZZGa68rBSf77Ul09z7AeF:Z1SE8l6LHGa6gk77UloMeF

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\Obezya.exe
      C:\Windows\Obezya.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Obezya.exe

    Filesize

    134KB

    MD5

    137d0d610541ee95dda97be7861ad5fc

    SHA1

    42e7c5b0c07e1acc6feb983f68b13448dd1a7c44

    SHA256

    dc43c59e0b8abb1af31ad08e334d1cdfe8a57e2fe1e73779786cb76616afe4b0

    SHA512

    3bd2720982207872dfe57787caac2b3f1dac5d4c9088e89d031f49831b03927cae98d888731968b9bd660c3ca9c90f090b6beccd4bf7d37f883eb4281a08950e

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    3b9ab7dfa66c454d090721fa890789eb

    SHA1

    1f87596c980ad078fb9df4a12efceb100198b222

    SHA256

    1c444073174c009a9a042464adab1573723e45e761ac0961b79ce498b70841cd

    SHA512

    4df78051d1a526d4408d2e45a0cb6cb7f1f5d0cff827291c30ae25c864317de44cc3d80d43fe482d7c15b131b849f6fed16abb184e47ad914a624b0c6b55ee75

  • memory/2108-20133-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-23436-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-51690-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-51686-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-11-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-51684-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-14-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-13-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-51683-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-26617-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-51682-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-51681-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-29748-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2108-29772-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2172-13818-0x0000000001F10000-0x0000000001F4A000-memory.dmp

    Filesize

    232KB

  • memory/2172-42845-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2172-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2172-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2172-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2172-12-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2172-2-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2172-10-0x0000000001F10000-0x0000000001F4A000-memory.dmp

    Filesize

    232KB