Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 17:00

General

  • Target

    52bdea080dd6ab19dc077fdc506cbfce_JaffaCakes118.exe

  • Size

    26KB

  • MD5

    52bdea080dd6ab19dc077fdc506cbfce

  • SHA1

    c2c29209337d064ff1cdcd28fd9bd7d6dc749807

  • SHA256

    0a35e86be26459ab7212af8b6b42f8548dc7371719b8c778c6f0cf2f9f1b0606

  • SHA512

    c69dceea0d02f26bd9a7040b1d8424137ac77562f34c6df53c0018669d8458801b2647acc061d73b7f67bf4e3ff7439a2f2d6c89a90cb1a9abd4cb8f3207719c

  • SSDEEP

    768:R/EvKzyD6T28Tpbv3Un8GCM1BlYceeDuj:GvIyD6v13qCeefj

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52bdea080dd6ab19dc077fdc506cbfce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\52bdea080dd6ab19dc077fdc506cbfce_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\nTdHcP.exe
      C:\Windows\system32\nTdHcP.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2972
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\Deleteme.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Deleteme.bat

          Filesize

          212B

          MD5

          4b27519e8a14ad06e3d17d612ba567f1

          SHA1

          0d89de7dac8ae962699a0cf8bdb678c23afb6e1a

          SHA256

          d7a6ecd31d44ec0e6bed0565ecad0ef3b78f83dea017db0f83d3562a5bc61cec

          SHA512

          1e114c8b8f0a1086c320f8bc870e9a938c4b1a33b2a3e5f15d83be02b38c1694cf3ff5e862169f6c0cb6edeb9e100ee2172451ddcfe7aa02e890aa47f0fa2036

        • C:\Windows\SysWOW64\nTdHcP.exe

          Filesize

          26KB

          MD5

          52bdea080dd6ab19dc077fdc506cbfce

          SHA1

          c2c29209337d064ff1cdcd28fd9bd7d6dc749807

          SHA256

          0a35e86be26459ab7212af8b6b42f8548dc7371719b8c778c6f0cf2f9f1b0606

          SHA512

          c69dceea0d02f26bd9a7040b1d8424137ac77562f34c6df53c0018669d8458801b2647acc061d73b7f67bf4e3ff7439a2f2d6c89a90cb1a9abd4cb8f3207719c

        • memory/2748-0-0x0000000000400000-0x000000000041E200-memory.dmp

          Filesize

          120KB

        • memory/2748-4-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2748-1-0x0000000000400000-0x000000000041E200-memory.dmp

          Filesize

          120KB

        • memory/2748-15-0x0000000000230000-0x000000000024F000-memory.dmp

          Filesize

          124KB

        • memory/2748-24-0x0000000000400000-0x000000000041E200-memory.dmp

          Filesize

          120KB

        • memory/2748-12-0x0000000000230000-0x000000000024F000-memory.dmp

          Filesize

          124KB

        • memory/2972-22-0x0000000000400000-0x000000000041E200-memory.dmp

          Filesize

          120KB

        • memory/2972-13-0x0000000000400000-0x000000000041E200-memory.dmp

          Filesize

          120KB