Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 10:16

General

  • Target

    2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    2f4fa1ab5bc62071519807bbc4a6b199

  • SHA1

    51f1d6e2517d84207a1c0560c8b8608dd3aba117

  • SHA256

    efcd32df90d152902953850f2f2252f97b86a477a9e1c3aa1e988ed6ed8716a4

  • SHA512

    88b6c79d855fdb50770bdd51f9cc93d2df34d7a3ca38f1c5ee690d2f2300361c37a4a65ce65af03bc0c55e1310e34215842395ce9e5fdcf60e9d47431d8033e0

  • SSDEEP

    24576:Uu+1Cp7W2mLIoQoyUN3ZoCh7uRR+Xp/105DASFy8X4pKOwFnqbC9gFWdlM79:V+1AJmLOY3iRR+ZN035IpiFn0C9/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\s1vg
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s1vg"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2796
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\s1vg.1
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s1vg.1"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2812

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\s1vg

          Filesize

          1B

          MD5

          6334c2ae05c2421c687f516772b817da

          SHA1

          0a80baa1797615faddb0ccfaa6d46382a6b3e0e2

          SHA256

          782e02029374527bd2a5fe7b9545df6c2911078e337a62573970b178d93db481

          SHA512

          0a708cb338efda1b923da3aa3b9c5bd1371776e503719fd90a1b5cae05bc64c28aca3e801b81738324adf8de61d09204a1b1ffb07bb96a0ec35c2f01d85af93d

        • memory/2032-2-0x0000000000510000-0x00000000006A9000-memory.dmp

          Filesize

          1.6MB

        • memory/2032-3-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB