Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 10:45

General

  • Target

    2fb7b36bfb47a05d3550e8912c852ab1_JaffaCakes118.exe

  • Size

    798KB

  • MD5

    2fb7b36bfb47a05d3550e8912c852ab1

  • SHA1

    0d4766cdd191cf22111f1bdaa610e50b6613c467

  • SHA256

    5308ade8b3627cbb184fc6ee70b2345cbdadc1afa8255fdca6a5db8ced6cb8ed

  • SHA512

    17fd5017bb3e76c1437a1483dc18857f0700f23070c928e9cec270094b75682abdf2717759c9559e63de5da8697d5009f6c40d1727380ff09597c710e98d85ac

  • SSDEEP

    6144:wD7GsXs2/RMeHZ9Vkjs7VZpylwYdGKgODMPaU8oS:cxsjswwVK14IoS

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fb7b36bfb47a05d3550e8912c852ab1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2fb7b36bfb47a05d3550e8912c852ab1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\2fb7b36bfb47a05d3550e8912c852ab1_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\2fb7b36bfb47a05d3550e8912c852ab1_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe [NEW]
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          C:\Users\Admin\AppData\Roaming\svchost.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

          Filesize

          471B

          MD5

          d4a12f78da45284fb3aae03da640ccba

          SHA1

          b249a7866b44db669e8f0b1fdc4e0069e3037e43

          SHA256

          fbee27a460a30e49e932cda67f938c1b1fb23bf49bd91bfed7e7e4388980e79a

          SHA512

          ffb410a3b90631e51bfbad591d21fdae22f514f46d47cf0f46fb3ccd7dbf837c293a5d7f92b8acda6594235813e8eb08052e3a5ba7426ad6b21d3da0f0c770b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_E7AFBAB1045CF53D322BC26D3E9BEB05

          Filesize

          471B

          MD5

          210afb2776c3150c6fe61cac708ddc7e

          SHA1

          5e9d423e09aee4883a3ff962025c4b59f79c3003

          SHA256

          25969228d4e7a86f0c07d89cb8e5b0bbc13b41a317cccfca08b522d9b98908ca

          SHA512

          e8583e29fc79e05c68807c4654b8066dbca94c3eb97bfc2b8c6c89a506a9e3c735aa34d55f037947331dad4bf5d714a402fd05cb6a99b7bfcd070f3f3f941862

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

          Filesize

          400B

          MD5

          1b366bcf53949a308c7a46bb3fc5046b

          SHA1

          42692ca352474de961c381b8a0086d6b3c4ae22a

          SHA256

          f8797e7170d2872ce2c4d001f225b87e5f06b976d3362991384dbc1510ba2934

          SHA512

          e2597888c1882538ccfd8f3e67be2eda39957da55ac7f11fb52f3f5f775231903aef97318d30d5d531d5ad20771d5624981897111141ff7d9560d8a27372a23c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_E7AFBAB1045CF53D322BC26D3E9BEB05

          Filesize

          396B

          MD5

          363c4f0e4de23c0752ebf94e593d3942

          SHA1

          fdf2e9e81fa569111492a133509f0818ee5115d7

          SHA256

          8dc6901f1013722d23372fe79dab671fb6e18187c186290f145304989374e803

          SHA512

          2b8f9116be2091b1146681bed2465488f2769cd457e8f9e501091b66f2c6afb1d3c55f821c0a509bd319c8fee2c5cf525de427e1a483f07252106f80a04142c1

        • C:\Users\Admin\AppData\Local\Temp\Cab8A8.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\lMwkG.exe

          Filesize

          1KB

          MD5

          9b6419564e2517bca5c02656ee34428a

          SHA1

          82fa924ab283fdced730a5a01980bc16038a4ebc

          SHA256

          7c3062f4433da04b86fb2a95156b3598d5e9e030494f9956755dcff563579a4a

          SHA512

          5d95f22c06e9685f3728cad4aec555c002e5ccffb9bead9930b77f852c996c2eb97f33f569950271393fdadb2e84e469ccf995e4743b0d5f6512741be9c2366b

        • \Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          798KB

          MD5

          2fb7b36bfb47a05d3550e8912c852ab1

          SHA1

          0d4766cdd191cf22111f1bdaa610e50b6613c467

          SHA256

          5308ade8b3627cbb184fc6ee70b2345cbdadc1afa8255fdca6a5db8ced6cb8ed

          SHA512

          17fd5017bb3e76c1437a1483dc18857f0700f23070c928e9cec270094b75682abdf2717759c9559e63de5da8697d5009f6c40d1727380ff09597c710e98d85ac

        • memory/524-84-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/524-80-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/524-79-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2316-35-0x0000000000400000-0x00000000004C9000-memory.dmp

          Filesize

          804KB

        • memory/2316-19-0x0000000002A70000-0x0000000002A71000-memory.dmp

          Filesize

          4KB

        • memory/2316-0-0x0000000000400000-0x00000000004C9000-memory.dmp

          Filesize

          804KB

        • memory/2700-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2700-45-0x0000000000980000-0x0000000000A49000-memory.dmp

          Filesize

          804KB

        • memory/2700-47-0x0000000000420000-0x00000000005A1000-memory.dmp

          Filesize

          1.5MB

        • memory/2700-32-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-24-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-20-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-22-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-38-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-27-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-28-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2700-34-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2728-82-0x0000000000400000-0x00000000004C9000-memory.dmp

          Filesize

          804KB