Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 04:39

General

  • Target

    1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    1631ebc0442e5cf82d17430040b722ed

  • SHA1

    bf828880dd306b7f798504440ffaeb1e481883b5

  • SHA256

    7f773a2e937933e7b42a72eb4d624186f78ac698e5d028b6d9d839b289272b02

  • SHA512

    81fff9a637b7323b049521d37923bf51acdb297529f77096607bc9b02058e89b2eb0dea878e1c0914d2f282213baaaa332543a85c8afaa14db98b6fa6db94054

  • SSDEEP

    1536:hipOgnbzTPaz+PK0+hy5/AvPTFWkfFezddT3ESlX3S5t9ivzCC7n+:0Znz7D5/Av8k9ezddASlX894zCC7+

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe
        "C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe
          "C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe

          Filesize

          76KB

          MD5

          1631ebc0442e5cf82d17430040b722ed

          SHA1

          bf828880dd306b7f798504440ffaeb1e481883b5

          SHA256

          7f773a2e937933e7b42a72eb4d624186f78ac698e5d028b6d9d839b289272b02

          SHA512

          81fff9a637b7323b049521d37923bf51acdb297529f77096607bc9b02058e89b2eb0dea878e1c0914d2f282213baaaa332543a85c8afaa14db98b6fa6db94054

        • memory/2416-24-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2416-3-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2416-6-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2416-7-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2416-12-0x0000000000230000-0x000000000025C000-memory.dmp

          Filesize

          176KB

        • memory/2624-1-0x0000000000260000-0x000000000028C000-memory.dmp

          Filesize

          176KB

        • memory/2624-0-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/2624-4-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/2624-2-0x000000000040A000-0x000000000040B000-memory.dmp

          Filesize

          4KB

        • memory/2764-31-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-37-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-46-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-30-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-45-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-33-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-34-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-35-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-36-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-44-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-38-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-39-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-40-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-41-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-42-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2764-43-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2776-19-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/2776-18-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/2776-28-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB