Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 17:20

General

  • Target

    1441ae2fd1e9d4da4d5777fbd0c450ff_JaffaCakes118.exe

  • Size

    325KB

  • MD5

    1441ae2fd1e9d4da4d5777fbd0c450ff

  • SHA1

    4862b4ea07cb55af8f569d7f086ba129c348a2db

  • SHA256

    f01d1d78173fb0ae73ecb128e48c8b6685db953de507368f863590fba857205c

  • SHA512

    97c086bff8a9d4cec9ce32154dcfbcfdc6a79dd2537f4b06a985d369b55f2918ae183edca19c35fa8ff994fccbacccf62b4c03a8423f62a7c7cede4d85519b4a

  • SSDEEP

    3072:KrlmVBilN8u+qtf6U8w8eQQLCczImGgy0mzqHh3kwQmcgrV9E004NOFVqDlEQrOJ:Krl8sf608N/cz9GD0mOh3Jhh9Ha24cYd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1441ae2fd1e9d4da4d5777fbd0c450ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1441ae2fd1e9d4da4d5777fbd0c450ff_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\bhs7501.tmp

          Filesize

          241KB

          MD5

          d70cbeebf027958b345d7a8c5f58bae9

          SHA1

          9e98d6fcb9e4a5119cf345e752f38ab013094775

          SHA256

          a41a9fefe9b545590af058111930503ec52babc6c8e22b856810dbe980a37359

          SHA512

          88a50f0a3edfb99b18089cb3f3f6e03ce6cbd164f6ad19405fde82aca18c62af617509e31ded26ae58f19cacb950b139443fabbfb179e43681845ad85f2b3d35

        • memory/2232-7-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-3-0x0000000000450000-0x0000000000492000-memory.dmp

          Filesize

          264KB

        • memory/2232-4-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-5-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-6-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-0-0x000000007432E000-0x000000007432F000-memory.dmp

          Filesize

          4KB

        • memory/2232-13-0x000000000B000000-0x000000000B7A6000-memory.dmp

          Filesize

          7.6MB

        • memory/2232-18-0x000000007432E000-0x000000007432F000-memory.dmp

          Filesize

          4KB

        • memory/2232-19-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-20-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-21-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB

        • memory/2232-22-0x0000000074320000-0x0000000074A0E000-memory.dmp

          Filesize

          6.9MB