Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 09:21

General

  • Target

    2e98e2e9fcf04f4d31ea8785927cc4d1_JaffaCakes118.exe

  • Size

    159KB

  • MD5

    2e98e2e9fcf04f4d31ea8785927cc4d1

  • SHA1

    bd1984adca0db801d3e05cf643a4f71680a21cfd

  • SHA256

    5b8a6c82452e3472e3f60be60e4780434cf0f5ddb24eac5d31afdc229b0ae897

  • SHA512

    ecfd8c1ed0aa79ec2e8170999816f7f035d238ebb98fe319757f0dc5cb3db16dea9b60b3babe39c7d1fb57e55e636eae10862c594c78942c3649d811bec2bf76

  • SSDEEP

    3072:t22ihA0m3BJf0AL5RPmD1sj3OeatQbkVDQMPzUKEBdzCFeHXQSWY:2A0m3T0AHu5K3FezpAdzuoQC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e98e2e9fcf04f4d31ea8785927cc4d1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e98e2e9fcf04f4d31ea8785927cc4d1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\biclient.exe
      "C:\Users\Admin\AppData\Local\Temp\biclient.exe" /initurl http://bi.bisrv.com/:affid:/:sid:/:uid:? /affid "fonts101kmbp" /id "scratchbasic" /name "Scratch Basic" /uniqid 2e98e2e9fcf04f4d31ea8785927cc4d1_JaffaCakes118
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabD7CB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD879.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    94B

    MD5

    dd1db9c4bf4c7ddaedd73404ef9244ba

    SHA1

    6f05c79eab2e8659a754d59925a3c81a8c5dd442

    SHA256

    58a2d3e8a3615b84c698f9507c4bbb2b22daf1d73d70847d76fda1dba1cd2129

    SHA512

    d9dca3a3ef6d4230c7ee68369227a6d6fb6b89913d54c53cb5292ac7a6f2332c26fa4793c584bd6df729d76118598ed38796fb60a0063475650878c67d850fb3

  • \Users\Admin\AppData\Local\Temp\biclient.exe

    Filesize

    219KB

    MD5

    c66293ccd7cbe84b1b8f393ca5e4e6d7

    SHA1

    c24089d407e6280b79bec86532e9de0118e4de71

    SHA256

    ffbae29e2f233767fd42909720497165ce3552427ef93efb2fc714fb4204755f

    SHA512

    7ff97aa71f182035f90ba10c3bf8087280e3f34bf717bda139d642f4e043c64aa2b98d82a90a32f1df4b76f9d7610af62390fe934e514c90c703381a421c00b7

  • memory/1600-13-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2156-14-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2156-575-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB