Analysis

  • max time kernel
    126s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 09:03

General

  • Target

    3ef667d9b7ac904d0e78a2f501521db0_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    3ef667d9b7ac904d0e78a2f501521db0

  • SHA1

    f369e9ea991e0b1b253e49c581ae3eb42f9bb0f3

  • SHA256

    107177148e0b632de09d45975368aa1cefb67685739b1a318ebb9ae825605515

  • SHA512

    c44e77f8eaf6cbac822c44e868a8cdfc4542f73ef1d1be572f592441ea964b91ad82c9d8ce44210a4fa4b77f872b78c9d3978dd02d459be008b3d897d324a026

  • SSDEEP

    1536:PfAiHwgicnislGltILYLU9KD02BBAdKJaPoYkwA4dIolx:PfQgicdlGvILcU9KQ2BBAkJaPxLIolx

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ef667d9b7ac904d0e78a2f501521db0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ef667d9b7ac904d0e78a2f501521db0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Program Files (x86)\ae148e5d\jusched.exe
      "C:\Program Files (x86)\ae148e5d\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\ae148e5d\ae148e5d

    Filesize

    17B

    MD5

    552bb86ed2797d3fd12ac0d273afaf75

    SHA1

    6e8633f9c24590779acbd3dd14c60f856320bc0a

    SHA256

    3ef9ff5da8272fd1b14c83f12c8d28fd9dbf32d56bcb714921032b02557fe789

    SHA512

    dab57227de02f4667cc8e2ec47566088b473caa0387caffbdfde37f3400da7d4f67dd222e83a4fa93592694bbcff7c52a2bcec074868baf221bc47d9370c8d2c

  • \Program Files (x86)\ae148e5d\jusched.exe

    Filesize

    204KB

    MD5

    23b3300d18b7681f04b48e24b0a6643c

    SHA1

    1402bc36c8d55d386e298dcea0a3f5f0c94bb596

    SHA256

    3dea64824071fb0a7f7b9cd4da6e3028774ad9bdc7103d4359fc117e9b66516c

    SHA512

    745cc92ab4758131b13b29531b1296f135e21e709470704a9cc2cfb3b94c28c023acb9225c502c24e1d10e514200c6636c7e8ab05ffa9237fa012acddac7184b