Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 05:44

General

  • Target

    2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe

  • Size

    573KB

  • MD5

    2be9e622c87e88f8b4ce6ea3d59bc2d1

  • SHA1

    873f50430422983ba704c60ced8b9a2695a6aa21

  • SHA256

    e788cf060e3eba4cd833c633ab9f083e1f9843aa447573ce6963065aeebb4c85

  • SHA512

    91eb8d895fb725465338a9f2f634c12f528cbee69cd6ff2eea66acb14d8d4a5c617ad2360ba9fcc3cfe30f6f09428b005f28c9c523119e190a2cb2fffda68f90

  • SSDEEP

    12288:xQzohboSTi5NwtEWhoUVC+AmecxWpPq0JSQZe:x6oe5NwtEiVC7JcxWpi0ng

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\84$$.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe.exe

    Filesize

    81KB

    MD5

    26ab78729f63175c1c5f1992c8a47165

    SHA1

    cfcdcee4f677de9087644ef4430256edfb5eb08f

    SHA256

    4e907e7bc2a97ad082fa3aaa170c71239c2c9dce6228524a6809f90f9790591c

    SHA512

    c79a085a2d2dc36f167f82c7485f29ced48be05cb77cd5fad5c93e71a2069b65d054a570a85ca357e294b1dbf525460eeccddbd4c0f13159bcc25023de6baf68

  • C:\Users\Admin\AppData\Local\Temp\84$$.bat

    Filesize

    569B

    MD5

    d8593db39e6ab576dd9f4e8e62d79f65

    SHA1

    4acddf5ffdcbc2b3bdf1d4d202442ae36b681911

    SHA256

    28a362d03cafd9c3f1fbc515e2ceaf3e23eb8416e6643a812c9badc7c427c5ac

    SHA512

    8aabc5cf4c1c061d4a12a8df8a8e8de4270b1edb61b1a910ce99ff6ca01b85c4e543a5d3d7b6f21bd9b3ffb93591521719dc59e29ad28665c0dee046fd3ffae1

  • memory/2264-0-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2264-11-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB