Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 06:55

General

  • Target

    2ccdad04cbeb20e214ad1aabebb472ae_JaffaCakes118.exe

  • Size

    564KB

  • MD5

    2ccdad04cbeb20e214ad1aabebb472ae

  • SHA1

    f659f3e5386c4705a904cba444dc1ea1369b53eb

  • SHA256

    e104d53f1bd162c25c5e1613793642f0d480d8e00a02d8959bb381bca2429878

  • SHA512

    9fea5ea403870ecc05ba9c9e61ce9fb97c5599e0ebd8476b148c3a159374e31024ec9e2c4bb852c938214638811a65b69ac540c25c059f3dc8c9be290d2e2efb

  • SSDEEP

    6144:M00KVVTQA1LzwWMTEB4X6lfXV8O1pw6044nHMYGuhV3sqgYtQsJUu0weFNtlvvcm:YFkBFNtdvOVe/2g/dU5AzG1p+1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ccdad04cbeb20e214ad1aabebb472ae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ccdad04cbeb20e214ad1aabebb472ae_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\ProgramData\Microsoft\sessmgr.exe
      C:\ProgramData\Microsoft\sessmgr.exe /a 1
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\sessmgr.exe

    Filesize

    564KB

    MD5

    2ccdad04cbeb20e214ad1aabebb472ae

    SHA1

    f659f3e5386c4705a904cba444dc1ea1369b53eb

    SHA256

    e104d53f1bd162c25c5e1613793642f0d480d8e00a02d8959bb381bca2429878

    SHA512

    9fea5ea403870ecc05ba9c9e61ce9fb97c5599e0ebd8476b148c3a159374e31024ec9e2c4bb852c938214638811a65b69ac540c25c059f3dc8c9be290d2e2efb

  • C:\Users\Admin\AppData\Local\Temp\Twain002.Mtx

    Filesize

    10B

    MD5

    0020473c05966e2e6b734b4e90448992

    SHA1

    2b0374ab3a9001638d981ae99de85ccf9fb3d7e1

    SHA256

    2a4480cef914b29f46767f5fef8dec03368be4d95d73a15737659466817d746b

    SHA512

    e4f200a4cb3630750a7ce55caae4e947d7f31f78dab598a442ff86a510e6c81d39a52b073cf3eafea82083e369f2b05a9d3d1f6ba8a52f8726650c570e81b346