Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 00:45

General

  • Target

    3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.exe

  • Size

    11.6MB

  • MD5

    3ce2bcac3aaadf814dc79b9850afca83

  • SHA1

    ea5e1ce590c1806129f6f9142c0f733981f21afb

  • SHA256

    fe9e3ee7e4f36342879d7c240888a9c4a3e609aa6b743f8f2c869f078d918b58

  • SHA512

    793433f77f8ccb374b1bd0334e4dd136b9b289086da8c22c41872add2e994d1bd17c4c1c3255fae0e980cd2ab038766004fdace2849d6dbacc725f59bf4c3e48

  • SSDEEP

    196608:m4Eu7Qs1yOnSFZEfGVNea0Y8Q7ZfweLVf4i4p0yi0hmPgCVPLe+lnA+Hj9dFC1TF:aXstUCf7HY8M9wmPhDLlAWx66G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\is-KKUQ6.tmp\3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KKUQ6.tmp\3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.tmp" /SL5="$30144,11667889,114176,C:\Users\Admin\AppData\Local\Temp\3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-KKUQ6.tmp\3ce2bcac3aaadf814dc79b9850afca83_JaffaCakes118.tmp

    Filesize

    1.1MB

    MD5

    61e31d9208c5b73d0afc01d99ef48f8d

    SHA1

    e180ebcfd6ae459c009ce46d07d371b756bd0610

    SHA256

    5ad6c16c78be382d06f02965d0b9cc786736ee741bd439a104405c9070501e6c

    SHA512

    e6826a46e6e8716e40ddc52b4c10a7bac1a7602a53dbb3163d9adc5b401e42ce207ed71be6d6548fd4af001edb68293455f9243434312152fca70215fab8a80d

  • \Users\Admin\AppData\Local\Temp\is-TL5M0.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1812-15-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1812-2-0x0000000000401000-0x0000000000410000-memory.dmp

    Filesize

    60KB

  • memory/1812-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3052-24-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-28-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-18-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-20-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-22-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-8-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-26-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-16-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-30-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-32-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-34-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-36-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-38-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-40-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-42-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB