Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 06:37

General

  • Target

    464d0df40e812b559193270a015096de_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    464d0df40e812b559193270a015096de

  • SHA1

    c99b6aef26c3d2dbb757ae9f059ccfa94e60908a

  • SHA256

    013d9902e74c6a2e2c9830361d00dca773bf28e5db7f22eb5618b02e2ffcb646

  • SHA512

    f1dc26eda36d83fa633c0671695ae033438dd17e878321c0aedb0189bafcec9e297578ee24507937d5e97a8b268b1ef93ee86d9781d0ad3149da88f1003035d0

  • SSDEEP

    6144:GclnqLykWN4Sl52tIbWeA+Slppx7wVANJmc:GAnqLybcIytPw

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\464d0df40e812b559193270a015096de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\464d0df40e812b559193270a015096de_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Roaming\RES.exe
      C:\Users\Admin\AppData\Roaming\RES.exe
      2⤵
      • Executes dropped EXE
      PID:2776
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\57iupulk.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFFA4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFFA3.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2660
    • C:\Users\Admin\AppData\Roaming\483325.exe
      "C:\Users\Admin\AppData\Roaming\483325.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\57iupulk.0.vb

    Filesize

    1KB

    MD5

    bfbce4f1734c909d1037faa601e4212e

    SHA1

    dc75d273038a7c6758972e6ee7077bf732611c95

    SHA256

    aecbae650c6b46e7371ff993671ecdc7f8fdc631e6a3a48f587e25c6c13b8ab9

    SHA512

    d2e3e7b8804af480d14cc58c06fe31cbefa9f3c6fd466c19bdd21799de8e8da6727021e17e1108e970902f21533ed6a2c40e8ad7f0fea245323690f9b359dca9

  • C:\Users\Admin\AppData\Local\Temp\57iupulk.cmdline

    Filesize

    234B

    MD5

    d54409c640ff2f8daf2f7be1af828be3

    SHA1

    b86bb442a27caa780656800d92aa822d2f2b9ea8

    SHA256

    2863592eb8f00adda931270f81c6901748226ac5ac3193834ad499a41cfacfe3

    SHA512

    8590ac163db316a24f238c44a4bf07c8a9cf582d8c6181cda02ba584389cf7f2f2d212562f13c6cf8d4389e8ccb3d8bc47a656db7838b9f1721978b8281b365b

  • C:\Users\Admin\AppData\Local\Temp\RESFFA4.tmp

    Filesize

    1KB

    MD5

    8a83ac33e5a8a359dbf96fedb6d5afcc

    SHA1

    24fb349317f90b8ccc13204255e3826c9f8b9d26

    SHA256

    0c1fbb2ed246d1675e3bf0ae7cb8a0ce1272bc957e2b2e2994eb1d508bbf2680

    SHA512

    6f7007a95da71c8294bb7c03b17f13687a474f9b0092b2b88f9f04caa2dfb46dd25e7bf049e22c99958c922b221d575c81f2082a4131ceceaa43af6c24c753f2

  • C:\Users\Admin\AppData\Local\Temp\vbcFFA3.tmp

    Filesize

    880B

    MD5

    b946541871befcbe1cc53561b5f33772

    SHA1

    c6b6b78a61d3c5fe43e647d3d303f77fa2a12bbd

    SHA256

    62ae403ed860398cdea5215ce330ccff99ef17def9ba9dc93dfcc40d2bf191b5

    SHA512

    864e4c94b98f0fa921656910cdc9b8e53b5317e0196b197effb68a19729d387af3b2a6fcd937b4296dc9ce0c0d2a95eb8ba87649e81a9fef7eb1ce11dba2b4b8

  • C:\Users\Admin\AppData\Roaming\483325.exe

    Filesize

    7KB

    MD5

    ed3f74f3fbaa0c03db722d0cea378cc1

    SHA1

    4e3764132d0e08456101a564480baad430680221

    SHA256

    9c480c4f372f4ee8acead16b80f8e61a049691b1be6fa93d2fd16f1db9bdaa64

    SHA512

    5533a7204d89603bbf4e0a1e05e92626b76daf1cc17d6bd81e07897488a87ad8bb95d3fb452bd0cf5aae584c8d77795755851df7d1f3c2dfe3b33dcf68a66198

  • \Users\Admin\AppData\Roaming\RES.exe

    Filesize

    1KB

    MD5

    f54b30f21b7b118bfeda2b1ed3482f84

    SHA1

    bde084ea60646dadabfed4eafe5bafceb4c11b99

    SHA256

    62bf121e7c7d3a221718d90de673ab23b9759765bb4aaed747883c7c7d08c2c5

    SHA512

    8431f8c37b0fbc1077eb0aef78ad2e10c11bb10e16ddbde833f568cbd69551e23c85aadcce4ddc71994a9fede59eca52bc99d595131c2264e4e9917abe87e44d

  • memory/2068-1-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2068-2-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2068-48-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2068-0-0x0000000074AB1000-0x0000000074AB2000-memory.dmp

    Filesize

    4KB

  • memory/2760-41-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2760-32-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-21-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-15-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-12-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-10-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-13-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-14-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-26-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-27-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-20-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2776-24-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-17-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-49-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-50-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-51-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2776-60-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB