Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 00:50

General

  • Target

    27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    27fcf2b5cea97e7f0b46efc56c4e51d3

  • SHA1

    3ed676010997f7b0784c3969a5e625ab8460fecc

  • SHA256

    e60164d938a58fb1cb736cd395dfa9c7db0126d4f3c326c48fe47372c9151f41

  • SHA512

    ba81363c7db6a5e84745702c7cb11d2273aab352110e6a09c12ffa102b27f0f80e2170881cdc869e7c7d7d132999e540c98332317205e1edbdeed755849f6660

  • SSDEEP

    1536:5TvlubSHe/jHLsh6LctKWH0gEtWTE/rli5Z1nWvjI4TWRtss+cfWAY+/Vb2XmzfH:5cbFvLctKWAW8AB8baRts4WNg2Xmav

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

    Filesize

    132KB

    MD5

    2da321ee2d987b5219b158a60d299398

    SHA1

    cde2d2937299dc5c177b183bd5c531695f90c215

    SHA256

    e7d9b93225ad64f3381a8c9a8e55e163a4e5bcf2221335ddfccdc6eb7cea8a46

    SHA512

    c478bec8a77dc012c404056150f727f34d9d88d3734cad914419eb9895d9ba0443dee38f844cc98108a9bb167a01569c3d7dd9f9d13976c05d633979b43098b3

  • memory/2608-1-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2608-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2608-8-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2608-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2608-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-28-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-29-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-30-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-33-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-34-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-35-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-37-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2624-39-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB