Analysis

  • max time kernel
    141s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 09:44

General

  • Target

    172c9c7d1b76f785b82d3db5abe732ea_JaffaCakes118.exe

  • Size

    429KB

  • MD5

    172c9c7d1b76f785b82d3db5abe732ea

  • SHA1

    58b84c98d0f1ae2d7d70b8918bcb0882bb50818c

  • SHA256

    e590d3cf5749f545bfbb3073144086722a4767ea88f329293443e48edf2e0f51

  • SHA512

    70a685c018feb54da3c939327724a20e30fd4fce68144dbeab082274059f29f126ab5ac301d9daac34c3f41528a8eaf37b57bb79c980a9002a79a6a9698c62aa

  • SSDEEP

    12288:i81Ed0hYcVhsWtHaXqtPmgWSWuamhK2Fz3pUm+Dz4tQKZVdw:i81EdVcVmWJP2JmhK2zuYGqw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\172c9c7d1b76f785b82d3db5abe732ea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\172c9c7d1b76f785b82d3db5abe732ea_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Users\Admin\AppData\Local\Temp\com_certificador.exe
      "C:\Users\Admin\AppData\Local\Temp\com_certificador.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\com_certificador.exe

    Filesize

    1.8MB

    MD5

    4b858d4d0b439bbe3f74868f713ee94b

    SHA1

    74e02e364a608a6b0d219e74e7c1c9a028f39c8b

    SHA256

    d663565a6ca088e2ca8b49ab0fa62b3497ab25063f87d84a42c9fe4c566ca4e4

    SHA512

    7a7a1d1a9c07d447a132616d840c2380574c8679a66b03145d7fe1ab122d2740f1399ff2b256a2fa3a39936cf94c4c1a0d56d4e40f9555e498c4c812657f7609

  • memory/2216-10-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2216-12-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2216-11-0x0000000000400000-0x00000000005D5000-memory.dmp

    Filesize

    1.8MB