Analysis

  • max time kernel
    63s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2024, 14:26

General

  • Target

    62b49060fec089977f2b765de5c01c95_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    62b49060fec089977f2b765de5c01c95

  • SHA1

    73f5831615236f1657d50c1deacb2fff938a3170

  • SHA256

    a60bb5639ce74b653dd63a979ba79af58b139cc51531038c24d30626fb0477e4

  • SHA512

    25318b648a37fca44446574ce264b3d74338cad2e6b7d35d24287c89e6403999018b920f5d65616b779606b92b44084bbac49bb29ae5b4ab85f24c1ac9ab9290

  • SSDEEP

    24576:uHVK/PmqiEGSQy/guUWg71mHc3zQWKI3/XdaxvBHle0ak4rU0g+Of5z3E:uIiEGHV7HYnccE

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62b49060fec089977f2b765de5c01c95_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62b49060fec089977f2b765de5c01c95_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\process32.exe
      C:\Users\Admin\AppData\Local\Temp\\process32.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 96
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2984
    • C:\Users\Admin\AppData\Local\Temp\write.exe
      C:\Users\Admin\AppData\Local\Temp\write.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Program Files\Windows NT\Accessories\wordpad.exe
        "C:\Program Files\Windows NT\Accessories\wordpad.exe"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\write.exe

    Filesize

    10KB

    MD5

    f8ed3b4b209e2cb49028e36cf06ca851

    SHA1

    71e0c405d0e615d55367df1bce4ceb19b3937a5c

    SHA256

    e46620bd4eb048fcb2a8f1541d2dbda8299e38e01a4eef9c4e7c3c43b96d0629

    SHA512

    87563891548b0eae7b410ad0877713216ed43c9160814a8bd14bc895eb8fafe2ab807d7666cf08e4882d8df2d46449d46bb347afe3bdcdb8034e533e135138b2

  • \Users\Admin\AppData\Local\Temp\process32.exe

    Filesize

    5KB

    MD5

    d2ed8fa3208e702b7d61728af768eed1

    SHA1

    54094aa272cb866a46c2ca5b56f4a094e0f48ffb

    SHA256

    9236208e312b2f47a0ef40e59fc0f364fc8e401717e1e46555c26bec8ab3de1f

    SHA512

    42442dc0b98f2abaea0c6516602d80df8a2a680278ecdc2b96fe5ce44685f7442347fd4ad13d9d99e0330cf0be7c0e9bbf22bd78c0173066221e430203c76313

  • memory/1172-0-0x0000000073EF1000-0x0000000073EF2000-memory.dmp

    Filesize

    4KB

  • memory/1172-1-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/1172-2-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/1172-31-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-14-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2096-22-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-21-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-15-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-13-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-11-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-12-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2096-10-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB