Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 14:43

General

  • Target

    30689d5387b5fcf72042e91e7e0e9bfe_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    30689d5387b5fcf72042e91e7e0e9bfe

  • SHA1

    8ad20a9b0a71cfc6b2e6c303971d57128daf79d0

  • SHA256

    9bb9c3895e3b3881593bc95f58efe149ef15439ed5b53c2d9387f83e5ce1bb8b

  • SHA512

    47963523f8af9f7b7fb6a20bb9356a7503d717346a6280bb9d4c84e4a727849f235aefe32743818e89868c2ce2e9860c9d317843f41607e0dfe7596d9ad14c4f

  • SSDEEP

    6144:Q6Q4uYV6jvSDxs36+7HqPFpawolmR8e2bLqU/i:Q6Q4/V6Tos36+7HAzawBR8P+r

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30689d5387b5fcf72042e91e7e0e9bfe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\30689d5387b5fcf72042e91e7e0e9bfe_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\Jzesea.exe
      C:\Windows\Jzesea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Jzesea.exe

    Filesize

    272KB

    MD5

    30689d5387b5fcf72042e91e7e0e9bfe

    SHA1

    8ad20a9b0a71cfc6b2e6c303971d57128daf79d0

    SHA256

    9bb9c3895e3b3881593bc95f58efe149ef15439ed5b53c2d9387f83e5ce1bb8b

    SHA512

    47963523f8af9f7b7fb6a20bb9356a7503d717346a6280bb9d4c84e4a727849f235aefe32743818e89868c2ce2e9860c9d317843f41607e0dfe7596d9ad14c4f

  • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

    Filesize

    390B

    MD5

    3b0f5fb2fb01f9cae18456a8d4ac7452

    SHA1

    e68139e751cf870ea2de96a147817eb4a8d2dd8a

    SHA256

    20097adfeef92d8620ceec429a3c6b5b3136dbcad357ea04006f8aca2af6bc7a

    SHA512

    591580b8073d20aab115e99be3fb6f570b89f74c2ad3a0291337290eb1944fdeee2506aaa508dd1e097d8c8850fe7deeecb4f738462981b78c5483a2bae46518

  • memory/1180-12454-0x00000000009F0000-0x00000000009F6000-memory.dmp

    Filesize

    24KB

  • memory/1180-1-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1180-39943-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1180-0-0x0000000002220000-0x000000000223B000-memory.dmp

    Filesize

    108KB

  • memory/1180-12480-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-28246-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-86766-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-24990-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-9-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-30408-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-8-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-68701-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-25003-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/2236-122035-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-146818-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-183683-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-204788-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-217229-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-217231-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2236-217235-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB