Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 11:10

General

  • Target

    1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe

  • Size

    497KB

  • MD5

    1771ba439a826e9f2951e799d35ba475

  • SHA1

    17eb29c98916d2a341ea027e6eaac44ddd1b0252

  • SHA256

    24916486a5a5cc57b5a6b9e9958e8c22b1be3bb94e369b2678258d96aecb8ba4

  • SHA512

    03e5771c6f1844a513f69b663c32c58de1916f6a7128fab8a985b6f68024d414b0c4f15b7979471a541bc7495318fe3e2db6baec638d9e44eae612e86a8b434f

  • SSDEEP

    6144:lZuuObR8sVImcyYm/gUIJSSXZhdcTvMDPvvouX/gM93IgGVFBkQcn9XhptwSkt/C:aV+mzFIJnZhdcT0jTwBk79n+SIEkBXxu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\WINDOWS\SysWOW64\C.exe
          "C:\WINDOWS\system32\C.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3000
        • C:\WINDOWS\SysWOW64\MDBoxClient Ver 1.exe
          "C:\WINDOWS\system32\MDBoxClient Ver 1.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2704
        • C:\WINDOWS\SysWOW64\C.exe
          "C:\WINDOWS\system32\C.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2616

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\WINDOWS\SysWOW64\MDBoxClient Ver 1.exe

            Filesize

            377KB

            MD5

            325293e253556f77f367ab96ca8f3201

            SHA1

            9ed1a53cf191676d275a03e3bf91ae80af34b139

            SHA256

            c5b650f7afff3f5803cbac8f9fe6fecc75855e1af81221b9530d846cda699757

            SHA512

            6a13e18fb6fd86552f4095795a84a256ec7100364e54492aa1289241384c11a54ca8b27a0820d537978cf260e4ec2cbf9de27685a2f32faaa0f279013223bc55

          • \Windows\SysWOW64\C.exe

            Filesize

            29KB

            MD5

            aebd7c2aa4722c0d9e3105b4e984e6f7

            SHA1

            b493c8f9ed7edf561588cceac43b2f216b284640

            SHA256

            89cb20ec55687ecef61ca0fe8323ff55c655de7d3dfd8b3db35de0e9d733d65e

            SHA512

            8c1d7567768944fd980e095b4c6819ebf04083e0e2796daf73ffdf35a96967fa70e125c3ba23f783c45d86902acf49b156018d47bacff92c78c31cbe86ded5dc

          • memory/1256-56-0x000000007EFC0000-0x000000007EFC1000-memory.dmp

            Filesize

            4KB

          • memory/1256-46-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/2616-35-0x0000000000400000-0x00000000004083A0-memory.dmp

            Filesize

            32KB

          • memory/2672-2-0x0000000002240000-0x0000000002241000-memory.dmp

            Filesize

            4KB

          • memory/2672-3-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/2672-16-0x0000000002220000-0x0000000002229000-memory.dmp

            Filesize

            36KB

          • memory/2672-15-0x0000000002220000-0x0000000002229000-memory.dmp

            Filesize

            36KB

          • memory/2672-32-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/2704-37-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-38-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-39-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-40-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-42-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-41-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-36-0x0000000074B41000-0x0000000074B42000-memory.dmp

            Filesize

            4KB

          • memory/2704-78-0x0000000002080000-0x00000000020C0000-memory.dmp

            Filesize

            256KB

          • memory/2704-81-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2704-82-0x0000000074B40000-0x00000000750EB000-memory.dmp

            Filesize

            5.7MB

          • memory/3000-49-0x0000000010000000-0x0000000010012000-memory.dmp

            Filesize

            72KB

          • memory/3000-17-0x0000000000400000-0x00000000004083A0-memory.dmp

            Filesize

            32KB

          • memory/3000-77-0x0000000000400000-0x00000000004083A0-memory.dmp

            Filesize

            32KB