Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 22:50

General

  • Target

    44904b504bb03c245a0ded8558001825_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    44904b504bb03c245a0ded8558001825

  • SHA1

    b6f58a653105190bbe6a5add16585310e4d6d91d

  • SHA256

    c3e76855c7dea89cb8b78e75ff95a08e1bcf4f8413ee17ea80c1bbe6e53e5265

  • SHA512

    be70291de4f955f376480e293ecbe0635a4067bc0e79e3d85f7150ef40a88ce00dc484a6a4b759bb78580aa0139fdfc807e25c8184f93ebe3b3d8d8cc2ce576d

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY/:hDXWipuE+K3/SSHgxM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\44904b504bb03c245a0ded8558001825_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\DEMBB05.exe
      "C:\Users\Admin\AppData\Local\Temp\DEMBB05.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Users\Admin\AppData\Local\Temp\DEM1056.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM1056.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Users\Admin\AppData\Local\Temp\DEM6577.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM6577.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\DEMBA69.exe
            "C:\Users\Admin\AppData\Local\Temp\DEMBA69.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Users\Admin\AppData\Local\Temp\DEMF5C.exe
              "C:\Users\Admin\AppData\Local\Temp\DEMF5C.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1680
              • C:\Users\Admin\AppData\Local\Temp\DEM6529.exe
                "C:\Users\Admin\AppData\Local\Temp\DEM6529.exe"
                7⤵
                • Executes dropped EXE
                PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM1056.exe

    Filesize

    14KB

    MD5

    e0115f684415060d5fd2ed498eef6c20

    SHA1

    8f803ae366da60f52aa72e31cab05ecaade46843

    SHA256

    90d630675a9e32fe87504592fe063f526fb4ca8830ed46b89d79ad2ab8a1ad0f

    SHA512

    c6d4b71f3e1537f823bb7e1d23e5d96eec736cfcb067beb7136fb054383d591ccbd27deccdc5db363e2159372e3b131e33b89fc3cdb738e11bee95277102402c

  • C:\Users\Admin\AppData\Local\Temp\DEM6529.exe

    Filesize

    14KB

    MD5

    5e323e5a7cc54116bce14ac6b8465210

    SHA1

    75745e963c223def51c02a1580067a9e0071a0a2

    SHA256

    e9b4d180054ed9e9857db2dd1e017e2c9b936c6567b14845bae586d8eb456d95

    SHA512

    2654890e182ba435ce6e9023dcebcba28da2213faf6efeb0c11e5d3a093d2ee4116c3ff660dff1cfd8970fc90b3b0c2a005cd8ef02bc016632ac7e771bc6116b

  • C:\Users\Admin\AppData\Local\Temp\DEM6577.exe

    Filesize

    14KB

    MD5

    e52160b08275c174e99debff9e1859ed

    SHA1

    990a71eef7ac73e6768785059c7046d3b542fed6

    SHA256

    4fd6c13ff0b389f4370f2dbeeaa926fe5af7a41ee77a0010a626e0d32d59046f

    SHA512

    8d177d951526eb04a5147380dec8d67669eb4bc026fe3af88b6071c0a44034a9dcbd570b019f3071a617aacd4c2d9cb470d31ea1f0391f8ae088bbcc3f629163

  • C:\Users\Admin\AppData\Local\Temp\DEMF5C.exe

    Filesize

    14KB

    MD5

    997dd8a501cdb68aa6ad0e8c53f91562

    SHA1

    594559e0550c4befe50cc9eac6cb81fed8cbc6f2

    SHA256

    8213c67ee1e855aeedc7ba2b886110eed817a8cd230ffa833f474a08b1d8b96f

    SHA512

    de245aee01c96a23b846fac50d2ce0a6d8d540bd8bc91d5f3c79670bd16dd6192a8435c64ad2aa475c74e7b0f90f665d22340a05a65f811d86e1061bcdf8b599

  • \Users\Admin\AppData\Local\Temp\DEMBA69.exe

    Filesize

    14KB

    MD5

    42b0d8e8597404959706501cc8be7af2

    SHA1

    7974c6a66cf6090bf2c28935bfa84401b502fd8d

    SHA256

    b87fd1fd9cf5cf6a3f8fa49d102e741b0bf48cbab002b92d089e8ceb9f14d431

    SHA512

    a12dd10b5929ba3b8ea2c8eec260e4b81c6f4c5bd8c5595f1223b8f2494ff815157fe969f11e060aded5986133de8343e5604e4b2963c11027120b54410d8eb2

  • \Users\Admin\AppData\Local\Temp\DEMBB05.exe

    Filesize

    14KB

    MD5

    d26972a6cbc040c53b5d22898678688e

    SHA1

    20771af65bbb88db4cc253233ab97c238bdeb099

    SHA256

    90c84047b5ecf501e4d3ffa52f2b5929d80c1dc7068237a5c8b62dabb98d3b92

    SHA512

    57f46bacc1bba239b4d198ab6dc8f6a44ebea6b37a1d84baaaa236e64278b999a8506c6316e343f56fc55c7af33558484c656408236fab81935c2e3c29f55316