Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:27

General

  • Target

    82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe

  • Size

    289KB

  • MD5

    82756b1a4f3239a822d4a81e15320353

  • SHA1

    9046965793f9d8aa6f46833c7f962d2abe229c84

  • SHA256

    2dbba606e95d70e691ac247031683902d25f79acdff65bbba3256c34ea33da42

  • SHA512

    351fcddf4e684127c1087fd7a519fb7c752413874a438acf40747066982dc8e6f098fbc73c034081645e63027a49e370838d57ad9fb94f685563866443856646

  • SSDEEP

    6144:KTqx4X4g0UE7zrHE/CYXct5Bt14efUxe4UptSlHT4:4ePB/kqb5BtcE4UptWz4

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1172
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1284
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1344
          • C:\Users\Admin\AppData\Local\Temp\82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2380
            • C:\Users\Admin\AppData\Roaming\Panico\equfa.exe
              "C:\Users\Admin\AppData\Roaming\Panico\equfa.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1888
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd5f8ee94.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2876
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1488

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpd5f8ee94.bat

            Filesize

            271B

            MD5

            4c658f4efb38c672acf49229451bbda8

            SHA1

            618bf23b19e01ace3ed9bee7aa4b802c56420096

            SHA256

            14ac1239de2a31043a46f342410ff8ee65a99e396d1e3c87080db6fc568f45a6

            SHA512

            2c765040c8ad771ec69d949b5cf169e13c65aa24d33cee2a0f335b5ebb0c5d2f426145a4ec6f2669d670dc0ce122839504e8c0d632557501633b73786f833fcf

          • C:\Users\Admin\AppData\Roaming\Panico\equfa.exe

            Filesize

            289KB

            MD5

            bceb8493bb6759ad3523be28e55c4132

            SHA1

            36362c5ecd94b6902fb4578f7d94c52b15a7d498

            SHA256

            04f3267a776791be361424349b6c475e7e3b8462860d355e3ec9fa8aedbe8cf2

            SHA512

            8a0cc5418eb4932490b306b037b87451ec2a13760bf74038c650f53fed89aee62c1323ba7e8bbe3dd72212bf004de35d8e0bf6761e1ba292394169f6f0bca5df

          • memory/1172-16-0x0000000001DC0000-0x0000000001E06000-memory.dmp

            Filesize

            280KB

          • memory/1172-17-0x0000000001DC0000-0x0000000001E06000-memory.dmp

            Filesize

            280KB

          • memory/1172-15-0x0000000001DC0000-0x0000000001E06000-memory.dmp

            Filesize

            280KB

          • memory/1172-18-0x0000000001DC0000-0x0000000001E06000-memory.dmp

            Filesize

            280KB

          • memory/1172-14-0x0000000001DC0000-0x0000000001E06000-memory.dmp

            Filesize

            280KB

          • memory/1284-28-0x0000000000220000-0x0000000000266000-memory.dmp

            Filesize

            280KB

          • memory/1284-25-0x0000000000220000-0x0000000000266000-memory.dmp

            Filesize

            280KB

          • memory/1284-23-0x0000000000220000-0x0000000000266000-memory.dmp

            Filesize

            280KB

          • memory/1284-21-0x0000000000220000-0x0000000000266000-memory.dmp

            Filesize

            280KB

          • memory/1344-32-0x0000000002A50000-0x0000000002A96000-memory.dmp

            Filesize

            280KB

          • memory/1344-33-0x0000000002A50000-0x0000000002A96000-memory.dmp

            Filesize

            280KB

          • memory/1344-30-0x0000000002A50000-0x0000000002A96000-memory.dmp

            Filesize

            280KB

          • memory/1344-31-0x0000000002A50000-0x0000000002A96000-memory.dmp

            Filesize

            280KB

          • memory/1488-37-0x0000000001DD0000-0x0000000001E16000-memory.dmp

            Filesize

            280KB

          • memory/1488-38-0x0000000001DD0000-0x0000000001E16000-memory.dmp

            Filesize

            280KB

          • memory/1488-35-0x0000000001DD0000-0x0000000001E16000-memory.dmp

            Filesize

            280KB

          • memory/1488-36-0x0000000001DD0000-0x0000000001E16000-memory.dmp

            Filesize

            280KB

          • memory/1888-11-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB

          • memory/1888-67-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/1888-56-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/1888-12-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/1888-83-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB

          • memory/1888-84-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2380-63-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2380-64-0x00000000002A0000-0x00000000002E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-6-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2380-5-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2380-2-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2380-1-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2380-52-0x0000000077DE0000-0x0000000077DE1000-memory.dmp

            Filesize

            4KB

          • memory/2380-51-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-48-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2380-47-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2380-46-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2380-45-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2380-44-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-42-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-41-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-40-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-49-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2380-43-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-53-0x00000000004A0000-0x00000000004E6000-memory.dmp

            Filesize

            280KB

          • memory/2380-0-0x00000000002A0000-0x00000000002E6000-memory.dmp

            Filesize

            280KB

          • memory/2876-75-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2876-76-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2876-81-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB

          • memory/2876-78-0x0000000077DE0000-0x0000000077DE1000-memory.dmp

            Filesize

            4KB

          • memory/2876-62-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB

          • memory/2876-71-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2876-77-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB

          • memory/2876-74-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2876-58-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB

          • memory/2876-72-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2876-73-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/2876-60-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB

          • memory/2876-61-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB

          • memory/2876-70-0x0000000000170000-0x00000000001B6000-memory.dmp

            Filesize

            280KB