Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 18:01

General

  • Target

    52f947a8d7598400747c6193fe60fedc_JaffaCakes118.exe

  • Size

    333KB

  • MD5

    52f947a8d7598400747c6193fe60fedc

  • SHA1

    a6f6e116abb6e45ee982e93a71845cc5595ad961

  • SHA256

    6365b5788820589c23b241b19871775bc8cbaed6268cacdca46c812bfa3238c1

  • SHA512

    c265a211a4f0bc1db2d7eaeaf22aab651e5cc9042e753edda7194fc3e6bf128c593a7fa665ba4ddfba4bfe0fa730c83014821b7a5d47d27da6662a9fbe05c157

  • SSDEEP

    3072:0A/yzn2myhzoV7iG4GvlLfNDJXZGk5q7IZe0wmF3vx:0Jnrya7iMpx0Wq7IZeBmF/x

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs .reg file with regedit 10 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52f947a8d7598400747c6193fe60fedc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\52f947a8d7598400747c6193fe60fedc_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~9415.bat "C:\Users\Admin\AppData\Local\Temp\52f947a8d7598400747c6193fe60fedc_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\xcopy.exe
        xcopy /i/y/e "22\NBA LIVE 08\*.*" "C:\Users\Admin\My Documents\NBA LIVE 08\"
        3⤵
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        PID:2296
      • C:\Windows\SysWOW64\xcopy.exe
        xcopy /i/y/e "22\NFS Most Wanted\*.*" "C:\Users\Admin\My Documents\NFS Most Wanted\"
        3⤵
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        PID:2148
      • C:\Windows\SysWOW64\xcopy.exe
        xcopy /i/y/e "22\Age of Empires 3\*.*" "C:\Users\Admin\My Documents\My Games\Age of Empires 3\"
        3⤵
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        PID:2152
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\1.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2540
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\2.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2844
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\age2.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2664
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\cs15.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:1856
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\cs16.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2220
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\Empiresx.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:1260
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\Heroes3.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2292
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\speed.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2500
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\starcraft.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2516
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s 22\war3.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~9415.bat

    Filesize

    539B

    MD5

    52fcda24697a476ae34a8483081acb21

    SHA1

    456c29f472cc014f4a01d016e0407605cea50d9e

    SHA256

    e853ae91e5b819704bb7b112bf7772a09ed69b001e5af0c9a9fef7e3d7a67a31

    SHA512

    773572f672a156643768d3bdf0fd94e83d665b7b3614d945c1eb11f04640d14e710655a7d9f63c7564fe1025e8c4f53feedf79e6e7fce501a8729911e710ea3f

  • memory/2340-20-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB