Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 18:12

General

  • Target

    530393154279276f6bba4f78ef5b6924_JaffaCakes118.exe

  • Size

    633KB

  • MD5

    530393154279276f6bba4f78ef5b6924

  • SHA1

    267df58209f559c8274903402bc8a780daeb6586

  • SHA256

    e0383ce7f8a056b5bc7d32f56397db2fea79646d626e797e08d755a4f2931cf5

  • SHA512

    5e9d461afc8178471ad3acd3b7c947f56899b6bfeb878a5458105af4e2085272dd26896ce67a166b02e77ff66566ced3864104867693d758d3a3cf82098b5e6b

  • SSDEEP

    12288:KPIpDii39Gd51ow4irTILkkJhF3Z4mxxT0MHoTAFbpJ:UEDii4j1osIQkJhQmXTKg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\530393154279276f6bba4f78ef5b6924_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\530393154279276f6bba4f78ef5b6924_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2996
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Hacker.com.cn.exe

          Filesize

          633KB

          MD5

          530393154279276f6bba4f78ef5b6924

          SHA1

          267df58209f559c8274903402bc8a780daeb6586

          SHA256

          e0383ce7f8a056b5bc7d32f56397db2fea79646d626e797e08d755a4f2931cf5

          SHA512

          5e9d461afc8178471ad3acd3b7c947f56899b6bfeb878a5458105af4e2085272dd26896ce67a166b02e77ff66566ced3864104867693d758d3a3cf82098b5e6b

        • C:\Windows\uninstal.bat

          Filesize

          218B

          MD5

          f6e19c053575368e0157ab3d169508f3

          SHA1

          004947b1597ef7a38029359f094157b51eae1874

          SHA256

          84fd806172d16d1ce2e887bbe2ae1d1a16943c06a6643e962fe06c7f660a1eca

          SHA512

          6f18ebf35c9a917b6945a4ca4715a7dca147039e8ce388a2f89f0dd694866f1b9dda84d67efce8885b10243f791c909af458f363df152e0d8af46859588c93a3

        • memory/1932-5-0x0000000001DB0000-0x0000000001DB1000-memory.dmp

          Filesize

          4KB

        • memory/1932-3-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

          Filesize

          4KB

        • memory/1932-18-0x00000000032B0000-0x00000000032B1000-memory.dmp

          Filesize

          4KB

        • memory/1932-20-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/1932-17-0x00000000032C0000-0x00000000032C1000-memory.dmp

          Filesize

          4KB

        • memory/1932-16-0x00000000002C0000-0x00000000002C1000-memory.dmp

          Filesize

          4KB

        • memory/1932-15-0x00000000002B0000-0x00000000002B1000-memory.dmp

          Filesize

          4KB

        • memory/1932-14-0x0000000001E10000-0x0000000001E11000-memory.dmp

          Filesize

          4KB

        • memory/1932-13-0x0000000003380000-0x0000000003381000-memory.dmp

          Filesize

          4KB

        • memory/1932-10-0x0000000003280000-0x0000000003380000-memory.dmp

          Filesize

          1024KB

        • memory/1932-12-0x0000000003280000-0x0000000003283000-memory.dmp

          Filesize

          12KB

        • memory/1932-11-0x0000000003290000-0x0000000003291000-memory.dmp

          Filesize

          4KB

        • memory/1932-7-0x0000000001E00000-0x0000000001E01000-memory.dmp

          Filesize

          4KB

        • memory/1932-6-0x0000000001DA0000-0x0000000001DA1000-memory.dmp

          Filesize

          4KB

        • memory/1932-19-0x00000000032A0000-0x00000000032A1000-memory.dmp

          Filesize

          4KB

        • memory/1932-9-0x0000000001DC0000-0x0000000001DC1000-memory.dmp

          Filesize

          4KB

        • memory/1932-25-0x0000000000400000-0x000000000051F000-memory.dmp

          Filesize

          1.1MB

        • memory/1932-2-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

          Filesize

          4KB

        • memory/1932-1-0x0000000001D40000-0x0000000001D94000-memory.dmp

          Filesize

          336KB

        • memory/1932-8-0x0000000002020000-0x0000000002021000-memory.dmp

          Filesize

          4KB

        • memory/1932-4-0x0000000002010000-0x0000000002011000-memory.dmp

          Filesize

          4KB

        • memory/1932-27-0x0000000001D40000-0x0000000001D94000-memory.dmp

          Filesize

          336KB

        • memory/1932-0-0x0000000000400000-0x000000000051F000-memory.dmp

          Filesize

          1.1MB

        • memory/1932-28-0x0000000003280000-0x0000000003380000-memory.dmp

          Filesize

          1024KB

        • memory/2180-26-0x0000000000310000-0x0000000000364000-memory.dmp

          Filesize

          336KB

        • memory/2180-24-0x0000000000400000-0x000000000051F000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-38-0x0000000000400000-0x000000000051F000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-39-0x0000000000310000-0x0000000000364000-memory.dmp

          Filesize

          336KB

        • memory/2180-42-0x0000000000400000-0x000000000051F000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-48-0x0000000000400000-0x000000000051F000-memory.dmp

          Filesize

          1.1MB