Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 00:59

General

  • Target

    450b69716756cf926c1319356bf474e6_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    450b69716756cf926c1319356bf474e6

  • SHA1

    f0773962b0dd2f0318016a3a24fe8221d45c51a6

  • SHA256

    dffade984d2bd276c81e244cba84bca1c5d4467ea1c6759a7d355599c2dd1c35

  • SHA512

    f2f3533cffe4bce0e787fec98adb7a9d3fffb7f2005827efee42ee62322697fb81bb3045ef3c67dea78b2a6880df294ad0ac64828844c02b2b3773fec1b2f1d6

  • SSDEEP

    384:zulols2dn/Q3V6NHkGRSiTf8bDy+xbYPmDru6uNJE:zuebd/QaRSksy+x9rulW

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:344
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1188
        • C:\Users\Admin\AppData\Local\Temp\450b69716756cf926c1319356bf474e6_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\450b69716756cf926c1319356bf474e6_JaffaCakes118.exe"
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: RenamesItself
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1328

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\cncvuty.dll

        Filesize

        27KB

        MD5

        9383de55de110ba8da062acb00e3842a

        SHA1

        d0c068a41ab295c982447e738b04501de855f7bf

        SHA256

        97f762a5fcb2461f6c1849cf79f2c30aca379eb97ec8e77501bf437fad617043

        SHA512

        8237a64872a9391dd524ebeeb05d0ac4c5fac4374f06925573136270419bee2ad851a0c7ff3c8a6e0587735671a054d5521838ae6eb0fb33b0c6fcdce2d9dd66

      • memory/1188-12-0x00000000024F0000-0x00000000024F1000-memory.dmp

        Filesize

        4KB

      • memory/1328-18-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB