Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 00:27

General

  • Target

    44ed37df880b56f52a1149354083d167_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    44ed37df880b56f52a1149354083d167

  • SHA1

    c41d9728dbc6aa51f3f88755b7c1e072f80e010f

  • SHA256

    ea818cdf1f7510d8d167f9898e3130f6656960d7bb16a2c938fc43d4f538ea4f

  • SHA512

    553a9d10f8ffb2e6b03d144bcda5eb4ab19407e3b365f8c222835e928ccf1b66ba9dfb31afbadfa885e0cb0a5f4c46b96a915d7cc02f9caa5b2891f1f049b4a7

  • SSDEEP

    3072:yGkx3zz8yFuVZa5STVjSec0D5B7gl98XY4gK5m0VQi0U:yGkJAsuVZVjSec0DjklKfmk0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44ed37df880b56f52a1149354083d167_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\44ed37df880b56f52a1149354083d167_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\temp\csssssrtr.exe
      "C:\Windows\temp\csssssrtr.exe" -install
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1832
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\~0.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2292
  • C:\Windows\temp\csssssrtr.exe
    C:\Windows\temp\csssssrtr.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~0.bat

          Filesize

          222B

          MD5

          d5d50b17b4afa4a444b9fc5ba88519db

          SHA1

          13e960a782f72b024babf38f3d240003ac626987

          SHA256

          fbe5cfb4b23bdcf2e7205ac8f7507ebc3ef886e38b297f8155975a0841904b86

          SHA512

          1b12eaf7b5646b99f8b6780746da090de8f4c2e47afb17643a2117ae10f45474309db78ed3e3e9ee76449045c3b1708006f999de33c8e7a0c792575b5ef57042

        • \Windows\Temp\csssssrtr.exe

          Filesize

          184KB

          MD5

          44ed37df880b56f52a1149354083d167

          SHA1

          c41d9728dbc6aa51f3f88755b7c1e072f80e010f

          SHA256

          ea818cdf1f7510d8d167f9898e3130f6656960d7bb16a2c938fc43d4f538ea4f

          SHA512

          553a9d10f8ffb2e6b03d144bcda5eb4ab19407e3b365f8c222835e928ccf1b66ba9dfb31afbadfa885e0cb0a5f4c46b96a915d7cc02f9caa5b2891f1f049b4a7