Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 00:08

General

  • Target

    277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe

  • Size

    221KB

  • MD5

    277d1af47dbaee6ad1c90867f6ffacb2

  • SHA1

    2d1b8bf98761788d0ee62eb703fa5b5cc597060d

  • SHA256

    e135fe83776a56ed2c189c0c0f0679c709a0042f175600d3326e10da118348df

  • SHA512

    40b0641800d4a0f5c65b0fd86422665685adb00987bcca84327afe8abb28a24d24c7ec03193af0c66e1723bf19d0cef169cd1dfca1d80a5fadb86740f845f159

  • SSDEEP

    3072:gSCvHByjhL/dLCMK8v730mXm0RWTQ2LyhtBxf1XW786Ofq1cU5xYmP03NSw98W:fjhLlLHYd0RWTQ2LyzYg6i8PYWW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\Hfijia.exe
      C:\Windows\Hfijia.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Hfijia.exe

    Filesize

    221KB

    MD5

    277d1af47dbaee6ad1c90867f6ffacb2

    SHA1

    2d1b8bf98761788d0ee62eb703fa5b5cc597060d

    SHA256

    e135fe83776a56ed2c189c0c0f0679c709a0042f175600d3326e10da118348df

    SHA512

    40b0641800d4a0f5c65b0fd86422665685adb00987bcca84327afe8abb28a24d24c7ec03193af0c66e1723bf19d0cef169cd1dfca1d80a5fadb86740f845f159

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    ab905025504823b5b187aee627e1bd05

    SHA1

    c9e923f19c78b44252defaf766812b9eed2d9f82

    SHA256

    0157bd53471dfb9f1e83b2674753b8dbfe3e370353277564b5b7c8e802c68610

    SHA512

    f8a5418b9f7f636f4e0a2cb3cee4738397a1ee5674f0bec4cc101fedf81f074a7229e42cbf3ccc4d3a6db6a0532411dfea48e201e64a6b71e74e1f0a3546e47b

  • memory/1528-45496-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-9-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45497-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-10-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45493-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45501-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-14-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45492-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45491-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45490-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1528-45494-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1712-8-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1712-45489-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1712-11-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1712-0-0x0000000000270000-0x000000000027C000-memory.dmp

    Filesize

    48KB

  • memory/1712-1-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB