Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 10:46

General

  • Target

    2fbd2b072bcfa89da7287da68acefb26_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    2fbd2b072bcfa89da7287da68acefb26

  • SHA1

    406e8dfed9d5c6588e1ef63db9678b76911bf963

  • SHA256

    7c84c1e4539ac87dabfaaed7007d404461aed8803bad64cf864341e20cce921a

  • SHA512

    aa08a4da9454feb37384a81983f392fb0ba09392f3ca3f6d593d0bbde122b30f5254cd82d318b52abd9ab24ab04f8e63d60f737efd3ca8d5890d6a1ce5f42ba3

  • SSDEEP

    3072:WWNiRyIIvgiw0xdsJ61CyAqXR7OeSM5ZrXSxNl2sPNQWZ8g4gWMdFEEx/gQT2:WPIYTmiqXgeXZUkDWpWMdFXxJ2

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fbd2b072bcfa89da7287da68acefb26_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2fbd2b072bcfa89da7287da68acefb26_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\Iwokua.exe
      C:\Windows\Iwokua.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2804

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Iwokua.exe

          Filesize

          158KB

          MD5

          2fbd2b072bcfa89da7287da68acefb26

          SHA1

          406e8dfed9d5c6588e1ef63db9678b76911bf963

          SHA256

          7c84c1e4539ac87dabfaaed7007d404461aed8803bad64cf864341e20cce921a

          SHA512

          aa08a4da9454feb37384a81983f392fb0ba09392f3ca3f6d593d0bbde122b30f5254cd82d318b52abd9ab24ab04f8e63d60f737efd3ca8d5890d6a1ce5f42ba3

        • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

          Filesize

          372B

          MD5

          ba49a874f9f04ad4f54b1f90080551bb

          SHA1

          6ce9ad5c1c788032e71c11fe75611e6c51f84648

          SHA256

          4b334a8e5e62abf53d57fb1dd1de579a0e0936ad0e354b8bfab5b9c866874976

          SHA512

          1b112e46c72ae5ecc0c2cc80684374a7dbd4da93d2e210e7d5e0bec7881df8145b886d20acf6bf6c2bba8b3d267fa994687ec32ffd88b194be4305421712ee6b

        • memory/880-2-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/880-0-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/880-7-0x00000000004C0000-0x00000000004FA000-memory.dmp

          Filesize

          232KB

        • memory/880-48103-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/880-1-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/880-5573-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-47785-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-10-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-11-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-47741-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48102-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-12-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48104-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48105-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48106-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48108-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48112-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/2804-48113-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB