Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 17:25

General

  • Target

    4356a8de9eaa3f0c18ce7d9023e25b8a_JaffaCakes118.exe

  • Size

    845KB

  • MD5

    4356a8de9eaa3f0c18ce7d9023e25b8a

  • SHA1

    9430f730b3441d013235f99f87ce2ca97a07abe1

  • SHA256

    1dedc497a475d03e3cc0af6584b4d2cd6abe208b1ecb90b94596265f2838443f

  • SHA512

    d7238d632f5a441d0b2802ce424b1ce97ad24ff3645a1dc530ca5cf36747805c663a92a01c05766ec1d10c65543c3b327c18cbef668ef17fa58227853d51a64c

  • SSDEEP

    12288:hkgPnIpVejUrImlaqRuuuzs8lJJjOE41i1byzqOvHMZNxO/YYmTvrjrSztTwD/wS:uq9OImnR0vNg1ihyzqQsFmYXTj6GIO5

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4356a8de9eaa3f0c18ce7d9023e25b8a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4356a8de9eaa3f0c18ce7d9023e25b8a_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\835626985.bat" "
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 4356a8de9eaa3f0c18ce7d9023e25b8a_JaffaCakes118 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2972
      • C:\Users\Admin\AppData\Local\02143.exe
        C:\Users\Admin\AppData\Local\02143.exe -i
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\835626985.bat

    Filesize

    437B

    MD5

    36c7d3ceeff5ff5730b0460aa0e8432a

    SHA1

    fa1b7624ef13e52127915e5ba8719cf33e05a38a

    SHA256

    5d0f4d496600684fc283a732d43cc3614620bd624edbc23a1507b7a5a30e95c4

    SHA512

    99c33544b459c06a1b9fc6140bc3768d974a59feabd293280d3128fb78c0e194d36a895cf8aaebabbe67f87b22cc26296c483b2acc7ab1a9888bae50edb5a87b

  • \Users\Admin\AppData\Local\02143.exe

    Filesize

    845KB

    MD5

    4356a8de9eaa3f0c18ce7d9023e25b8a

    SHA1

    9430f730b3441d013235f99f87ce2ca97a07abe1

    SHA256

    1dedc497a475d03e3cc0af6584b4d2cd6abe208b1ecb90b94596265f2838443f

    SHA512

    d7238d632f5a441d0b2802ce424b1ce97ad24ff3645a1dc530ca5cf36747805c663a92a01c05766ec1d10c65543c3b327c18cbef668ef17fa58227853d51a64c

  • memory/2992-22-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-31-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-39-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-34-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-33-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-32-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-30-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-21-0x0000000000220000-0x00000000002B8000-memory.dmp

    Filesize

    608KB

  • memory/2992-28-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-26-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/2992-27-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/3012-0-0x0000000000860000-0x00000000008F8000-memory.dmp

    Filesize

    608KB

  • memory/3012-1-0x0000000001000000-0x0000000001431000-memory.dmp

    Filesize

    4.2MB

  • memory/3012-3-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/3012-15-0x0000000001000000-0x0000000001431000-memory.dmp

    Filesize

    4.2MB

  • memory/3012-14-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/3012-2-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB

  • memory/3012-6-0x0000000001000000-0x00000000014329FB-memory.dmp

    Filesize

    4.2MB