Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 03:14

General

  • Target

    15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe

  • Size

    743KB

  • MD5

    15f1a4f226616e25120cc0f5cf660f4d

  • SHA1

    344b57cff93712c5003fb97f0fe6fb28e4f494c3

  • SHA256

    cdbadc9abd00d0651339f0079dd86530a8ae5e7c86df8c1fec752a5e1a8ced60

  • SHA512

    ac364746262ecb658368948d0036aad20ec5c22e4c53329d5fb3fc8ede42f542a2ddaf022fe3839d7c3c6effbe07159f0a4d70e8122fd167e53dc91d139a35d0

  • SSDEEP

    12288:wX/eOyaiqK+XTQcJtEWySf0KY5nwX/eOyaiq/8Xu:wX/eO4qdDQcLEq8znwX/eO4q0Xu

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 49 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 25 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Users\Admin\AppData\Roaming\hdgw.exe
        C:\Users\Admin\AppData\Local\Temp\15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe -dwup
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Users\Admin\AppData\Roaming\hdgw.exe
          C:\Users\Admin\AppData\Local\Temp\15f1a4f226616e25120cc0f5cf660f4d_JaffaCakes118.exe -dwup
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Users\Admin\AppData\Roaming\hdgw.exe
            C:\Users\Admin\AppData\Roaming\hdgw.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2876
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2892
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1548
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1552
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1768
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2128
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:484
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2092
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2228
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2380
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2108
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2372
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1776
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1260
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1684
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1276
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:604
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1240
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2296
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:700
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2272
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2056
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2740
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2676
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2220
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2932
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1664
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:3012
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3020
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1880
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1288
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1760
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1616
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2280
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2780
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:320
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2232
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2960
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:448
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:2212
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2488
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:896
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1732
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1632
            • C:\Users\Admin\AppData\Roaming\hdgw.exe
              C:\Users\Admin\AppData\Roaming\hdgw.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1636
              • C:\Users\Admin\AppData\Roaming\hdgw.exe
                C:\Users\Admin\AppData\Roaming\hdgw.exe
                7⤵
                • Executes dropped EXE
                PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\hdgw.exe

    Filesize

    743KB

    MD5

    15f1a4f226616e25120cc0f5cf660f4d

    SHA1

    344b57cff93712c5003fb97f0fe6fb28e4f494c3

    SHA256

    cdbadc9abd00d0651339f0079dd86530a8ae5e7c86df8c1fec752a5e1a8ced60

    SHA512

    ac364746262ecb658368948d0036aad20ec5c22e4c53329d5fb3fc8ede42f542a2ddaf022fe3839d7c3c6effbe07159f0a4d70e8122fd167e53dc91d139a35d0

  • memory/2356-12-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2356-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2356-4-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2356-2-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2356-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2356-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2356-13-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2356-6-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2528-44-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2528-48-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2528-50-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2692-41-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2692-51-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2892-67-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB