Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 04:24 UTC

General

  • Target

    16250ca80c1a776a59f589dcc957aaab_JaffaCakes118.exe

  • Size

    281KB

  • MD5

    16250ca80c1a776a59f589dcc957aaab

  • SHA1

    3144c6282874384f81751d17337f806bb74992d9

  • SHA256

    156c16ed1b628dde9f97d89e3973319b2e373db248532932116b304c72c63cfb

  • SHA512

    c21765130c3fac6925718fbf3af8234075ba4836609e65c940217e42ea6ddc0f3fa33674aa18b913995a878390485a9541d3f92a8c981f966ef41371011ffa18

  • SSDEEP

    6144:NRUqOskIpmOrdo6ryr6y3lmcoGE+DNruGpZti7q8soYuz0p/ksTeQ:1IjOr662T3lm3GRDNDPs7qroh1sTJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16250ca80c1a776a59f589dcc957aaab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\16250ca80c1a776a59f589dcc957aaab_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2792
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2756

    Network

    • flag-us
      DNS
      k2n.3322.org
      Hacker.com.cn.exe
      Remote address:
      8.8.8.8:53
      Request
      k2n.3322.org
      IN A
      Response
    No results found
    • 8.8.8.8:53
      k2n.3322.org
      dns
      Hacker.com.cn.exe
      58 B
      122 B
      1
      1

      DNS Request

      k2n.3322.org

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      281KB

      MD5

      16250ca80c1a776a59f589dcc957aaab

      SHA1

      3144c6282874384f81751d17337f806bb74992d9

      SHA256

      156c16ed1b628dde9f97d89e3973319b2e373db248532932116b304c72c63cfb

      SHA512

      c21765130c3fac6925718fbf3af8234075ba4836609e65c940217e42ea6ddc0f3fa33674aa18b913995a878390485a9541d3f92a8c981f966ef41371011ffa18

    • memory/2568-6-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2568-9-0x0000000000400000-0x0000000000512000-memory.dmp

      Filesize

      1.1MB

    • memory/2568-10-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2792-0-0x0000000000400000-0x0000000000512000-memory.dmp

      Filesize

      1.1MB

    • memory/2792-1-0x0000000000260000-0x0000000000264000-memory.dmp

      Filesize

      16KB

    • memory/2792-2-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2792-8-0x0000000000400000-0x0000000000512000-memory.dmp

      Filesize

      1.1MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.