Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 19:50

General

  • Target

    14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    14b7649a52f7192cc47b3c6848763d62

  • SHA1

    8db772be994e79818e67a247ba6b143f82071545

  • SHA256

    88850ceb48f96140e0f925bb8b758cd7daa2e566ea1f1d248895fdf82241d847

  • SHA512

    8ee8b02bc995900ede2592e17503d68476d9b6e63899e941cbd494c0919d7ebf907b6f4e4bf393abced28e3e8bf5ddf31983463fa3e90a23f92161765b03ba29

  • SSDEEP

    3072:fEJXTtgD6db1teDy9VusR1enuYbcrBLCfEgloIvDaNtEmidLPUduKkf0eA6z:8J5geztee9FR1eTboMM7IeDz7ksY

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Program Files\Common Files\caocao.exe
      "C:\Program Files\Common Files\caocao.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2296
    • C:\Documents and Settings\qiuqiu.exe
      "C:\Documents and Settings\qiuqiu.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\DOCUME~1\qiuqiu.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2924
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\Users\Admin\AppData\Local\Temp\14B764~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Common Files\caocao.exe

    Filesize

    24.0MB

    MD5

    e02c004d342074c20b4b6b6e87726338

    SHA1

    0c502d2c0e8c59bf20f40dd353b19bd2b34e066a

    SHA256

    16e2279d6e4e07957b2daefc11358d14819bc6d085f80bdb0110ea8fb186b122

    SHA512

    88722f33f42d917989bb0b0855540dd3fe033aba4be0fac6929b571ced37e1248caceceb465f90e1bf29a5ca1a496fb492e7db575b48c9f961ffbc62997799d9

  • \Users\qiuqiu.exe

    Filesize

    24.0MB

    MD5

    02523b3aef9fde7905f1853dd0bf31c6

    SHA1

    d08d465b9217860af1034df74b559a4d7c47c382

    SHA256

    d53160db51106c5abb0d3ef1267eeffe6251e5f3ac24e4a8b7033dcec1144ece

    SHA512

    665a2614ce258deac6ad3adf6cf33790fafc239cf92921a5f790c2f89719bda43ead9ce77d4896ba543154a126fa6cfb21ed13baa145256dcf67bcaff26a9e97

  • memory/2108-35-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2108-41-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2296-26-0x0000000000020000-0x000000000002B000-memory.dmp

    Filesize

    44KB

  • memory/2296-27-0x0000000000020000-0x000000000002B000-memory.dmp

    Filesize

    44KB

  • memory/2296-29-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2296-28-0x0000000000020000-0x000000000002B000-memory.dmp

    Filesize

    44KB

  • memory/2824-7-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2824-24-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2824-5-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2824-0-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2824-6-0x00000000003D0000-0x00000000003D2000-memory.dmp

    Filesize

    8KB

  • memory/2824-4-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2824-25-0x0000000000240000-0x0000000000289000-memory.dmp

    Filesize

    292KB

  • memory/2824-14-0x00000000003F0000-0x00000000003FB000-memory.dmp

    Filesize

    44KB

  • memory/2824-32-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/2824-3-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2824-45-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2824-44-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2824-2-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2824-38-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2824-1-0x0000000000240000-0x0000000000289000-memory.dmp

    Filesize

    292KB

  • memory/2824-31-0x0000000000240000-0x0000000000289000-memory.dmp

    Filesize

    292KB