Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2024 04:58

General

  • Target

    7268b9bb7a8cfc17aada8ce822189593_JaffaCakes118.exe

  • Size

    78KB

  • MD5

    7268b9bb7a8cfc17aada8ce822189593

  • SHA1

    c657883c4b75b249959a6353b12610f6abc84d5c

  • SHA256

    c7182b1df57e21c4c22c9bcc4fb318d02ecc5b789fdad505c1212ff3781da575

  • SHA512

    4575420fdc6e2b904a03d6bc8014b20d9ce199fd0f7f2fa0662d7defc9c3f9f085ec7f59ced5698ec4043f7d10360f8a57f577a0cc53dd84ca0cf12b03be4ae4

  • SSDEEP

    1536:QRWV58Hdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtU6C9/p1SF:QRWV58Gn7N041Qqhg89/u

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7268b9bb7a8cfc17aada8ce822189593_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7268b9bb7a8cfc17aada8ce822189593_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mo1nb3oo.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBC4.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2768
    • C:\Users\Admin\AppData\Local\Temp\tmpA4D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA4D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7268b9bb7a8cfc17aada8ce822189593_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBC5.tmp

    Filesize

    1KB

    MD5

    1ec730828bdd5483d334955f869c1a39

    SHA1

    2630e4ab545c3a14db73d2fb5476010619047c92

    SHA256

    944daab28efe9466ff267a876dd5b279ad315e67a7aa9d333186d53e6f8cc4d8

    SHA512

    311e3311d6e8f4c3384ad9f520f84c9a04e2bdd0e310fce1a77f5b9d8f0cba10517ceb4fdb480fb71e9ee67a9df89047d76f2c1c1b070e63e2b46c007a1e349b

  • C:\Users\Admin\AppData\Local\Temp\mo1nb3oo.0.vb

    Filesize

    14KB

    MD5

    acf7debde8d0929174c8748e821c9029

    SHA1

    e22be84e1f613ae9b865adefefa3f50011574596

    SHA256

    723da05b9d23851cc80df163f4c1880fc1f49ef6ff80c9af8c2bb44dde9c4a27

    SHA512

    865a36a5bd14d1cd07384d2788dd991d37fdcb2feb3ee5f96cb94f67234c085604f9afd42aee7b5d3e45dcfc1fb9352b75f0beaf6abf280b2d3326347151b108

  • C:\Users\Admin\AppData\Local\Temp\mo1nb3oo.cmdline

    Filesize

    265B

    MD5

    19bc3ab0168e6a71bd678d27be31d85d

    SHA1

    a2c7a8ded752c0ed2185f6877c15c457a024fe2f

    SHA256

    942850dab71013657662355a529a09a901d47efec0b95711f27cdae8358c09c9

    SHA512

    50e80a4c3bb8e882b204d5d91e0fff9b9a7c010ad5643fbe2804a7d26f92ad8221dbc0ab221157970f51819a6a0c17a3dcdda3a49104e4cdde7b78a7e8e84d8b

  • C:\Users\Admin\AppData\Local\Temp\tmpA4D.tmp.exe

    Filesize

    78KB

    MD5

    af47da6d2e7522bcc83f0e5d3be82d85

    SHA1

    305a9a32c024c010d6b046af6003e8dacb9933ee

    SHA256

    cca80cc3893b88878a027efb8c8196566a4ef885c7e5e50197720beea2c1c9bf

    SHA512

    951c68e1cca046bbac16755aed0d52627fb5776dd499b3efa6554536c20ad26a87292b8cbd2f596ff07bc90f43cc684cfe22a299a663fa8e366624dbbc2f29bf

  • C:\Users\Admin\AppData\Local\Temp\vbcBC4.tmp

    Filesize

    660B

    MD5

    2f7113d4b268963928dde4e2e1abab52

    SHA1

    cfd58b0f2b80d9057ea7a74443fef2f672816f32

    SHA256

    c82476585915d862fa248998537e37e293fb319b6e62d5fcfe01dde75078647e

    SHA512

    008d03371d884be6ab2c47c580efe6f4ed7a2ff7f5fb56b75c13a321d3c96b24413c199cdc339cd5ed0d0f31a97918e31b9f3d2c241977fc360c3289848362f9

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2540-8-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/2540-18-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/2628-0-0x0000000074CA1000-0x0000000074CA2000-memory.dmp

    Filesize

    4KB

  • memory/2628-1-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/2628-2-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/2628-24-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB