Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 00:16

General

  • Target

    279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe

  • Size

    112KB

  • MD5

    279557500722a4c6b44a6310628cb75d

  • SHA1

    3bd37e9ddf2680e3ee705e0bb7f87fdf52433131

  • SHA256

    9dc6949643aaed62f4b37e2d5828b13ce9324880392b198124ec7683dffee13a

  • SHA512

    8ea5a3d06037d674c373ea165d135e90fab0d14b73f19146c012bdd2a275ff3ff4ef03dea7743f0293650cab38df927983241cbd9038597e125dd4d969967ea5

  • SSDEEP

    3072:fyN4eb8nd+YaHKk0K/nPE173NJkTB+nuvgKMSfFIb:KN4eb8nd+YgNv817NJIB+uvTM5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Pkf..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Pkf..bat

          Filesize

          238B

          MD5

          403e4672259fc5147508a678bdc0400b

          SHA1

          1a5d570e2980e0c6c715aed1867a2486c26ca4f2

          SHA256

          8442d14c1cb05ff1686480f31343cc07bfc92f15d6c2e4b54864355f1ef60087

          SHA512

          f28a3b119de6bf5afbd540d3cccc58adbe21d5e38477bc552d668510d7fbc114894524684fe71967e5ebd2bf5cec7bc454d8059491c72c2988d6f2040502a2a0

        • memory/316-2-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/316-1-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/316-0-0x0000000000402000-0x0000000000403000-memory.dmp

          Filesize

          4KB

        • memory/316-4-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/316-3-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/316-6-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB