Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 12:50

General

  • Target

    3a1bbf5d8c0a521e740fa900fb3b3147_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    3a1bbf5d8c0a521e740fa900fb3b3147

  • SHA1

    0d18c32269867c72bf568303d5a9711d45e6e617

  • SHA256

    b9480120be98f7369d372a385fcdff0769143af90513c26a461e7aeafa8fd9e8

  • SHA512

    dd95c1ea90f41eed9d10e544aa613330aa5a20ff25f08eab2211fb972a5760cb1741878d7da286d71141846ad4b544d1a9c8fda5936a78188d1774bcdeea34de

  • SSDEEP

    49152:Mjj/kQXg24D/iJctgCoFavzVrFsjlRfOxde:M3/9g/dtsWF8R2i

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a1bbf5d8c0a521e740fa900fb3b3147_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a1bbf5d8c0a521e740fa900fb3b3147_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Users\Admin\AppData\Local\Temp\Inst_1105.exe
      C:\Users\Admin\AppData\Local\Temp\Inst_1105.exe /quiet /norestart
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Users\Admin\AppData\Local\Temp\INS7251.tmp
        C:\Users\Admin\AppData\Local\Temp\INS7251.tmp /SL3 $7023A C:\Users\Admin\AppData\Local\Temp\Inst_1105.exe 1653354 1656798 66048 /quiet /norestart
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\INS7251.tmp

    Filesize

    522KB

    MD5

    9893a0d7224fa1fd5f39614c18120265

    SHA1

    c63eafa4b4155f4ce089e515197bae692ee74dc5

    SHA256

    5fea72be939af54721857ba760b6a12825da0d8327e41c4ee2faa223f48c6c0e

    SHA512

    fe63e80f0510036b3ddbdd9cccb8ce387b6371a6e1c3199a05930d95536ee00ec7106a12e2a7ac7aedb704d44e081bf1f190288c8d08a4f990ccf3ec8d20c428

  • C:\Users\Admin\AppData\Local\Temp\Inst_1105.exe

    Filesize

    1.6MB

    MD5

    3a5b8f1c48b0ee81302dc62de1eee9c2

    SHA1

    6cec4b89f91d7e3e4ffcab40124f7cf77707dfbd

    SHA256

    2982a0cc4c6c04a47a70ae73a7e319d9b4c3833448195be33cc967845f410a2e

    SHA512

    405a6676e3fc1a41f2b53d356263acbfea457df55ec4c34cc6b42bfad6e218491dc5ec31dc77430fc2afcea2288a2d4fd9378fc7777a31149fa459aff6b8e2c0

  • memory/1360-20-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-26-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-14-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/1360-13-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-18-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-8-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/1360-22-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-24-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-40-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-28-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-30-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-32-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-34-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-36-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1360-38-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/5108-12-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB