Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 10:52

General

  • Target

    2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe

  • Size

    460KB

  • MD5

    2fd4574410dcc58ba7db356c2c2f2394

  • SHA1

    ee16178e74d59a8888dea2ac77bdc6619d383cb9

  • SHA256

    7cc662404c49ab5eab63bdaa6addc3f7455e74d6448a86ac7d56b3de5477c9a0

  • SHA512

    9807a6254b8bc8b52596bd5e29c917ff9d34e5be6c10039482cb0232938935dc7c1ad0e050ad752c1f2a16eacb9b968e4ce22a506276c70c8ddcfec638daff85

  • SSDEEP

    6144:0XP2VguYIgrGRq6tHPbhpDEOb59H7wsh2iESrhtiJg3BGVP0SLDFEpojsJOY0:KkgrL6tAOb7H7jcSrDiWGVMUEpojsJq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe
      "C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\parent.txt

    Filesize

    460KB

    MD5

    2fd4574410dcc58ba7db356c2c2f2394

    SHA1

    ee16178e74d59a8888dea2ac77bdc6619d383cb9

    SHA256

    7cc662404c49ab5eab63bdaa6addc3f7455e74d6448a86ac7d56b3de5477c9a0

    SHA512

    9807a6254b8bc8b52596bd5e29c917ff9d34e5be6c10039482cb0232938935dc7c1ad0e050ad752c1f2a16eacb9b968e4ce22a506276c70c8ddcfec638daff85

  • C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe

    Filesize

    7KB

    MD5

    ed9f29dcad3d7177bb3a022a6148dbe9

    SHA1

    c13ff13952181c5aa5137c6bc1cddb924abacd33

    SHA256

    d29936029335e8eddb46e1c1f0b34ab469e78c7f3c4cf807264d50291726ef14

    SHA512

    21508b7a1ebff3aa167b35bebb8c6ca2e32089443c6a6fbd9456720038a6b94a891491c436cba1658e8c40022749cc11b48da69464b2a90b57ba87989bb02198

  • memory/2440-12-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-26-0x0000000021FE0000-0x0000000022786000-memory.dmp

    Filesize

    7.6MB

  • memory/2440-10-0x0000000001FA0000-0x0000000001FE4000-memory.dmp

    Filesize

    272KB

  • memory/2440-13-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-14-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-15-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-8-0x000007FEF5DFE000-0x000007FEF5DFF000-memory.dmp

    Filesize

    4KB

  • memory/2440-11-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-27-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-28-0x000007FEF5DFE000-0x000007FEF5DFF000-memory.dmp

    Filesize

    4KB

  • memory/2440-29-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-30-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-31-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-32-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2440-33-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB