Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 09:10

General

  • Target

    171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe

  • Size

    153KB

  • MD5

    171029aa1b2fb70e327a4954d9b2aa20

  • SHA1

    fbd2a6a8ed5a1b4d66ab3d25280fe5016ca56a12

  • SHA256

    15a7e0deb10ed66a4fc154762aa9cebd0b1f57aaf2f2455fbe3b4408d5fd488b

  • SHA512

    56c2db8d0cc8b09cc74c1ec1a0415df143185d6a0a41796a25178cc37b447a990f18f2820d3311c9321729f4bd43f0fab7b27aa46a85964d6189f054b5a502c2

  • SSDEEP

    3072:ykZCrvugF1PG2+pCPNDrht5YMIaVRsRsOj8cbsbtH:y4Crvug22nP9CmV6f8cGH

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4364
  • C:\PROGRA~3\Mozilla\gmbbhqc.exe
    C:\PROGRA~3\Mozilla\gmbbhqc.exe -davvhfe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4564
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3932,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:8
    1⤵
      PID:2328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Mozilla\gmbbhqc.exe

      Filesize

      153KB

      MD5

      c095e42ffd5013a928a3c1737c902bab

      SHA1

      7eda93df17577d9a99af421d03e55cc4e1780e22

      SHA256

      48e14c01ba6b00abfb0f166eca3057da720dc31e86d8d277f86c32ff0b294672

      SHA512

      b141d9aad56c809e9deb8338ef6dfa3d7b5b6a8bae491cf7efc3e0899194ad15b843240f74ecc528b7585cfde0fb631fd484e6b3e1085ef2b593ce7067ede748

    • memory/4364-2-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4364-1-0x0000000000405000-0x0000000000406000-memory.dmp

      Filesize

      4KB

    • memory/4364-3-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4364-9-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4564-11-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4564-16-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB