Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 22:36

General

  • Target

    3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe

  • Size

    266KB

  • MD5

    3c6291ecf5bfec497ae02de4a1ee1c2e

  • SHA1

    ac5159fa58e3a55b8746a3556eb8369621cfa638

  • SHA256

    f6ae0d76223b2dbff0a974c581e40213ce4fd23bafd1c466ea9dd569e418c0e2

  • SHA512

    e896cfe34563d2b9b3d5cee93693e9eecea972e7ed0a2a4451239027e5d648731ea52949969ec104a240cbd8a7ce423926640f16b8df20008fa7477df93bcdaa

  • SSDEEP

    6144:9R/exBKWaCZUZY1UW2uP/THuqWs+ddbYFZj6ESE6R/ev9:94b7vZUZY1UgWlddEFt6ESE64v9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk
      C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk
        C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk
          C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnk
            C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnk
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk

    Filesize

    170KB

    MD5

    f98b72d59a4f58f1fe62170841eb36e0

    SHA1

    adf6bdb1d1f322606a070c562fe81c0c019b9d1d

    SHA256

    2afb6060e9a06975c30b314f61acf83056c97160bc4c53fe841708099158d34d

    SHA512

    da8143df5b4d36e3153cd4fd9e69ff081e75201cf30184f8bfb71aadf788563d72a3801125fee9fb31737de50b89bc74dc7333f423631e2b5151c26965ab3bc6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\QDCD.EXE

    Filesize

    80KB

    MD5

    dde62e6ffb8d1ee6e0357a1d77ec031d

    SHA1

    ac6701f7428739ea115ee82fac035cbf2c28a48e

    SHA256

    eaf1d66d2b7baa3239f126c5f5f88214fe7e6f8aac5b829f83d8a7647373d034

    SHA512

    7490eb996c222690bd94c50c8199ba799aaa091d15017c6a6f374ffe05fe4ebbcc56ca938202a2d8352b84e49722cc7e6f14c35a5cde15473267b84f43466d1f

  • \Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk

    Filesize

    234KB

    MD5

    24d79ab0f88bb18ee9dfda0578fb5ace

    SHA1

    67c4814a95d6c58ad417ec4ec7a63184e9ab8647

    SHA256

    2f652b4e2777c46b0491d021eab4dd922060606f9a1582ffe0a6b2ad3e88ade7

    SHA512

    7a9f4648e5585570fbd91c8c6b73de83cc8d7a52dafc4fc8dbf6912dd210721412d5f1b29cc0d0b0648c8352c25e0d76ea2bc9f94b019b5cf6540269d5e4da1e

  • \Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk

    Filesize

    202KB

    MD5

    001bfe74e2098f95a4b1ed0df659bc7b

    SHA1

    225702323f9b42da5df15763639d974fa9665a18

    SHA256

    5dcef42edfff6e7af09534f4f2ba0a3741840a4651e9409d5617ac2042b9c4b4

    SHA512

    38a67bad479da89fffdb1c1dc8bd5733bfa7d115e8e2443a023059788fc3823b8f85e30e763083b4da48ac089e1627a74af5e5483b1a57e6f8c6d63145b19247

  • \Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnk

    Filesize

    138KB

    MD5

    9dcfe0a3fe891fe62a332c6fc5c30d52

    SHA1

    51c61f25c0398f059d4cfbe0f5e1cbb4cc65ccc3

    SHA256

    df26b332ec60554655ce20d3bb0bbd13c0492ca01fefcf20ff27b6c5c726302a

    SHA512

    aafce9fcee709a40069cc143fa34ae3ade13c27747c0d737af80905621b34b058910744286dd9e056dcef4362fcc53b458b7df49da834a4e4b4e8c89bfc7b90b

  • memory/2652-41-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2652-63-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2668-38-0x0000000000280000-0x00000000002A6000-memory.dmp

    Filesize

    152KB

  • memory/2668-64-0x0000000000280000-0x00000000002A6000-memory.dmp

    Filesize

    152KB