Analysis

  • max time kernel
    34s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 00:02

General

  • Target

    9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe

  • Size

    571KB

  • MD5

    9ead56f9350f3516c20393d444c4d7ed

  • SHA1

    7001b8e3324fa30b3bdcf516ef0d56e9702b9a80

  • SHA256

    d3257ae8197f50ea531263f79ec829700c8a114ea5326551bae26bdaac61d06e

  • SHA512

    df26a28ffe9e17bfeeef87eda2142f00ec797d914e5c6fac74dc5695222834341270a24d0e845a78c55f57ee34af5980c9372c846e8a2667b0b51cb2ea5cbc41

  • SSDEEP

    12288:5MMnglWkhK70cEbt/yoQSMPi2JIU87W/vTdg+OKQ2HqnSlsfE8x:5M44WkhA0LlyoQSMP3JI2vTdgCyH8c

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\ProgramData\ko2233.exe
      C:\ProgramData\ko2233.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s C:\WINDOWS\temp\tmp.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2724
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c del ko2233.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\tmp.reg

    Filesize

    1KB

    MD5

    a95044fc8bd71a6ecdd487f2a30f1d4e

    SHA1

    0e1ba880fdc2ac01b84febdbb4b5325a5ecfc706

    SHA256

    77730b194cf461a72285734ae3aafa83b435bb6b5587f31779f2ef5e43666906

    SHA512

    ee8d894e25716c5b54809855ca73ae680dee9b01478cbd8b9417d3d388448df496b27c1f7ab75a9757dc76d8e41ad1a64a5a720e249fcd9a25707ccda5f6692d

  • \ProgramData\ko2233.exe

    Filesize

    1.2MB

    MD5

    5555a8f5c2656185a9385981a24db0f3

    SHA1

    cccdbf7cced5abf7811a242c573ad88cab7f11c6

    SHA256

    eb3cc01ad47d40a9a67ceaa3f88f9aca907ccdbc6f0b186a616b27d78b8bd778

    SHA512

    ca31e2976484e88636165ecdf66d999625dcc5964a24d6be9d85539d6bedb1adb51d43d9a573b3e7869dfade5998a898d25c039109dd7482ba846bbf65e956c5

  • memory/2424-13-0x0000000000340000-0x000000000034D000-memory.dmp

    Filesize

    52KB

  • memory/2424-15-0x0000000000540000-0x000000000055C000-memory.dmp

    Filesize

    112KB

  • memory/2424-19-0x0000000000540000-0x000000000055C000-memory.dmp

    Filesize

    112KB