Analysis

  • max time kernel
    14s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 17:41

General

  • Target

    436735c435c2483e28c36f6f8f07971e_JaffaCakes118.exe

  • Size

    111KB

  • MD5

    436735c435c2483e28c36f6f8f07971e

  • SHA1

    5f39ca88cb874f53e976004ed2587058799c1dc2

  • SHA256

    5a82d966862af706f11517f55d27fd914bf3aedda981c79be1e6e3620daee244

  • SHA512

    0038c9e33ba2eb9ab76f98f2c83ba8e03b7430cbb54add91a3130b846f3e00b1d9486e9639aaf37538c12f2bbdc69860e471b40b0d9eb7ff638d89eb543997bb

  • SSDEEP

    1536:kbgi7RoTgsXMXDfTQPpQa00+A8Ih6Mj1BWay+n3msfL1OJxh10FIb:kbgqaTPcXDfTOQav+QnDLyIlC10FIb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\436735c435c2483e28c36f6f8f07971e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\436735c435c2483e28c36f6f8f07971e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lvb..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2840

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Lvb..bat

          Filesize

          238B

          MD5

          9397df07518b69f7b0262b090bb24a1a

          SHA1

          553b4ea4fc92e9a951051fc66ad8ae8f2516cef7

          SHA256

          d392bf7fdabdd1e4930c9c8a6e5154a84f6c57e688145d6684e9d1568b700c2c

          SHA512

          0c8a6d486e467070f61e7589f6bd0b05c74ca26295d20ac9fc6e7288084dadb99b32a736ce0114458518fff2c53dd2e6401e375739cd1eb415c80fb2443e739d

        • memory/3016-0-0x0000000000402000-0x0000000000403000-memory.dmp

          Filesize

          4KB

        • memory/3016-1-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3016-2-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3016-3-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3016-6-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB