Analysis

  • max time kernel
    129s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2024 09:17

General

  • Target

    731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    731a72c330851c00eddaaab7485e1ab7

  • SHA1

    1d915d4b2ff73fd945d7be5015148e8a0a0aa1f4

  • SHA256

    5f024533a5a2ae34dd52255157eb1da31519ef8ab852c298e0fc38226d5d4783

  • SHA512

    a08b34fc881d2574c886b5c676f0bd862649bb846f54f13592ea3258be95b4ad4559903e0fe83d43c77c69ba28f3ae782d776edec60f227362deebe864c7b521

  • SSDEEP

    24576:M/ZwBeJgRh7/tH40tFbeiG7AhHlCGR6dwskBphv7YqokULr8K/GCYYeTY:EM/t7ip6HQGR6d8YqoF/84GCYY

Malware Config

Signatures

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\14.exe
      "C:\Users\Admin\AppData\Local\Temp\14.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\13.exe
        "C:\Users\Admin\AppData\Local\Temp\13.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Users\Admin\AppData\Local\Temp\12.exe
          "C:\Users\Admin\AppData\Local\Temp\12.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\11.exe
            "C:\Users\Admin\AppData\Local\Temp\11.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2916
            • C:\Users\Admin\AppData\Local\Temp\10.exe
              "C:\Users\Admin\AppData\Local\Temp\10.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Users\Admin\AppData\Local\Temp\9.exe
                "C:\Users\Admin\AppData\Local\Temp\9.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2284
                • C:\Users\Admin\AppData\Local\Temp\8.exe
                  "C:\Users\Admin\AppData\Local\Temp\8.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2096
                  • C:\Users\Admin\AppData\Local\Temp\7.exe
                    "C:\Users\Admin\AppData\Local\Temp\7.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2988
                    • C:\Users\Admin\AppData\Local\Temp\6.exe
                      "C:\Users\Admin\AppData\Local\Temp\6.exe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:592
                      • C:\Users\Admin\AppData\Local\Temp\5.exe
                        "C:\Users\Admin\AppData\Local\Temp\5.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:2560
                        • C:\Users\Admin\AppData\Local\Temp\4.exe
                          "C:\Users\Admin\AppData\Local\Temp\4.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:2428
                          • C:\Users\Admin\AppData\Local\Temp\3.exe
                            "C:\Users\Admin\AppData\Local\Temp\3.exe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:956
                            • C:\Users\Admin\AppData\Local\Temp\2.exe
                              "C:\Users\Admin\AppData\Local\Temp\2.exe"
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:2344
                              • C:\Users\Admin\AppData\Local\Temp\1.exe
                                "C:\Users\Admin\AppData\Local\Temp\1.exe"
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2136
                                • C:\Users\Admin\AppData\Local\Temp\newest keylogger.exe
                                  "C:\Users\Admin\AppData\Local\Temp\newest keylogger.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2532
                                  • C:\Windows\SysWOW64\TGFEPI\OKJ.exe
                                    "C:\Windows\system32\TGFEPI\OKJ.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of SetWindowsHookEx
                                    PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\12.exe

    Filesize

    1.5MB

    MD5

    10b57df1591d237e3fcc5015544bfa80

    SHA1

    746c92af65c434ce4b0376293f026b4e22e54223

    SHA256

    78e63304544052b6ac499587064da764351d04b1c8a3070e9d28f308e29ff630

    SHA512

    2f648bd5207d356e278e85525467e552b36f874757fac28a9424140942ce26a8926deb2a8d2d7fb2b4216f0a1a059154893964a9033a6bfa4a3cbb56c691dba6

  • C:\Users\Admin\AppData\Local\Temp\7.exe

    Filesize

    1.4MB

    MD5

    5ca640fe3769a2f1bfe215671c9845ec

    SHA1

    d5ed3e19e5989ca70266ba577aa701e6134a175a

    SHA256

    fda13669ef8d83312943bf5950222329c4bec38724f49a61e67ec452041e4b53

    SHA512

    ceeea7fa08a6fed9495018dfb4f7adeca138f84ae3397f6f2bd9d01f7133102f44c8725a2fa72f442e566b4f289278fde9c808b09098056396ac8a4296f90d77

  • \Users\Admin\AppData\Local\Temp\10.exe

    Filesize

    1.4MB

    MD5

    3a925270bf9609d45a2b4df97e221057

    SHA1

    7cffb8b41181bc11f4ba8a004ba46b2a6b0bf915

    SHA256

    78a99ba1618fcb648b3ea18867e4ec5e00b32a79081252c5bcd3d2894b148519

    SHA512

    db79b1d573d46a4b50ff39915a766224d37ca9dba886d71e5916300a4ed3329f0ba68606eca211fb131a4826a85a053138adb165bf2b051050886d454e2421a4

  • \Users\Admin\AppData\Local\Temp\11.exe

    Filesize

    1.4MB

    MD5

    a92f43305031e90ca4f5f4e4934184e5

    SHA1

    44e3ae161bb6a04939b2f8863abda964a624b474

    SHA256

    39cc23a60a887c3aef044438ca1e2fc409a6510ab366741f9e6e2a75daa55adf

    SHA512

    54d63286d90482d8cdb8571f5cd907e8ef08835d9a7e7f030a03aa5d6bc90439436cdd3865cb12ea0f3d129da6bbec97a573eaec348883832496c2dd03cf9220

  • \Users\Admin\AppData\Local\Temp\13.exe

    Filesize

    1.5MB

    MD5

    3de6849144e5efbf50d4e0cf121c0948

    SHA1

    b31182d4f8293e771e5297ba6eadd4a7aa85bf7a

    SHA256

    eba2065f5758f32da2967c4dcbd1dfe9ceefe98de0ae037e94d1e20deaa4afea

    SHA512

    81b095fa5c1bd4466064dffcc8a2db75f5d6d5bcbf021d6a407461ae0e416fd0caa452e7c3efdd5b60eac8a53f531aaf553a13509443325db00c149d90933ce6

  • \Users\Admin\AppData\Local\Temp\14.exe

    Filesize

    1.5MB

    MD5

    b2d3d71c66396b7c29a1df9da1bc3ebe

    SHA1

    8bf4bf4683af44c6e5e9b0f35b8fd02c1eda5a6e

    SHA256

    8ad5cf0e0d958123ff47d866d7e6b8a16cc64bccc019e27b8befa5d77139fbcc

    SHA512

    34f87807720cabf4a74b8609985f637da41e61a65894d9806de5884496b6c79e4d0956d19bf19efecb61da29db93bafdc373d5e079a4479aec9eeb831a8f38a7

  • \Users\Admin\AppData\Local\Temp\5.exe

    Filesize

    1.3MB

    MD5

    484ecf89540746869807f45148a2f2e5

    SHA1

    407e9242c74cf6d206ced86935ebe3a398ca9a38

    SHA256

    eb9ded3cea62d3f5f994b3ff1f93c261859d20ccd82e324d269c81b0d43a0f70

    SHA512

    3de402ca92d265331bc6445e1d8e0c48b29af91fc4a433e7ec5af1c16e081ab9a677aa51dfea2014163f5c3c20afb2e4941cdfadf6772fcfbdb920e96492c062

  • \Users\Admin\AppData\Local\Temp\6.exe

    Filesize

    1.3MB

    MD5

    41c3b7ce9fa12290b6d3e23f6782d86d

    SHA1

    b389afe59b59d7a15e7ed53f642ac098c1108242

    SHA256

    fd32899eed87b2da5c2eb071ac673097e4608a54fb0e612f1271efe782365b4f

    SHA512

    09fc2afdb3ff084ed27557dbe6ed1ef1f034c9065ed609cd00aef738e3acef79cdbfe147253ec9034a5a9ae6c31aa1629cb1c4c99a689332369799afebd96d73

  • \Users\Admin\AppData\Local\Temp\8.exe

    Filesize

    1.4MB

    MD5

    e850c0929b3ee67fa81ba6e13b2d001d

    SHA1

    dccec3171a4dab04c0f7e99ece55038c19ffe0dd

    SHA256

    69a47188c35cab062d0b07c965e7c49613827c42788c4fe89f821735cdae35f3

    SHA512

    60a62106412dd821dfa97efbab8051578764a44f665b6db463496fd7942289428fd1084c297d5b1bb0f1d24c2828067c80451c478a8a4552620ce7ab06f4b259

  • \Users\Admin\AppData\Local\Temp\9.exe

    Filesize

    1.4MB

    MD5

    20e965b046fadf039f7f1234e06bde40

    SHA1

    353e0b2c7fff94667a1d7ba899a2fee8a7282e6a

    SHA256

    5c42a1bf9934333991bb3ae3c555fd7fdb5548816e53ce58db19475f7738e04a

    SHA512

    c06e2cc9924a3f47431eda60544e7a7a7d66d2a48f46e8706e35c420651c216194dd08a2716e116e07ad8cc5a14dd2f49740191ca01a984501106a04e8cfcdcd