Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 01:43

General

  • Target

    9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe

  • Size

    5.9MB

  • MD5

    9f1f16de6755f29a852e3b955a9bc867

  • SHA1

    5e5bf75f40b1777176ce36b0ce0ef6014eb6c8ef

  • SHA256

    d563a31a5bea70ba4ac0cb6e52061d1ec18aa0dc30d1c1f3ce16b4377ce8ddc6

  • SHA512

    933373b80525b3cdfc6fc8edaafdb7db9986812ebf44dd40c7d32ab6d8c8ed074df3e97fd933e7018e0e44a88f983705343825cc9a6c2a5ddae8cf04f1e89718

  • SSDEEP

    98304:1bYLG01chcME9qGigwR8hcfMksQbzAfVrYe5vDCzd38moANZ1lv33:1OtoGhcEkszd5GJ33

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\Project1.exe
      "C:\Users\Admin\AppData\Local\Temp\Project1.exe"
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • System Location Discovery: System Language Discovery
      PID:1984
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\saws.wav"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Project1.exe

    Filesize

    630KB

    MD5

    6f55750feb16232ed4f3474cd3e0b860

    SHA1

    940ba5ec15b545a2bde8de840ad699d97ec29525

    SHA256

    49329976da56d2ecd8fa33dd086af1079e8a6267288cf9a2c0a261a82a8d8d9b

    SHA512

    3599e2bb49fbb59bdd8c225cd2909df1f8b979573470d358ab250ef5398334c7bda4de670421b02fbb4518889c183d66c0c22127dd95cd75c3e64cd019309877

  • C:\Users\Admin\AppData\Local\Temp\saws.wav

    Filesize

    5.5MB

    MD5

    058bd7ce50e8da302bfd70b9086acee6

    SHA1

    bac29a7529adfb06b09c8a79ebfeb78dc4a1fbef

    SHA256

    49ea0d84b47bef0d038b626187e0b7195ee320caea8ca10e7145487f4bece001

    SHA512

    8f878711be523c2f13e470117e0041a7e18d02bcfa98d3a29875e12dfb845acbcc8344d25474fcf155a2ad661897256780c5f2084e817fc0d1fc3fb3f94eee64

  • memory/1984-62-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1984-9-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1984-18-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2384-58-0x000007FEF4540000-0x000007FEF4551000-memory.dmp

    Filesize

    68KB

  • memory/2384-28-0x000007FEF6B60000-0x000007FEF6B71000-memory.dmp

    Filesize

    68KB

  • memory/2384-26-0x000007FEF6BA0000-0x000007FEF6BB1000-memory.dmp

    Filesize

    68KB

  • memory/2384-56-0x000007FEF4580000-0x000007FEF4593000-memory.dmp

    Filesize

    76KB

  • memory/2384-27-0x000007FEF6B80000-0x000007FEF6B9D000-memory.dmp

    Filesize

    116KB

  • memory/2384-21-0x000007FEF5ED0000-0x000007FEF6186000-memory.dmp

    Filesize

    2.7MB

  • memory/2384-25-0x000007FEF7130000-0x000007FEF7147000-memory.dmp

    Filesize

    92KB

  • memory/2384-23-0x000007FEFB050000-0x000007FEFB067000-memory.dmp

    Filesize

    92KB

  • memory/2384-22-0x000007FEFB720000-0x000007FEFB738000-memory.dmp

    Filesize

    96KB

  • memory/2384-39-0x000007FEF65A0000-0x000007FEF65B8000-memory.dmp

    Filesize

    96KB

  • memory/2384-51-0x000007FEF7630000-0x000007FEF7640000-memory.dmp

    Filesize

    64KB

  • memory/2384-50-0x000007FEF4A20000-0x000007FEF4A32000-memory.dmp

    Filesize

    72KB

  • memory/2384-54-0x000007FEF4720000-0x000007FEF4732000-memory.dmp

    Filesize

    72KB

  • memory/2384-53-0x000007FEF4740000-0x000007FEF4751000-memory.dmp

    Filesize

    68KB

  • memory/2384-52-0x000007FEF4800000-0x000007FEF482F000-memory.dmp

    Filesize

    188KB

  • memory/2384-55-0x000007FEF45A0000-0x000007FEF471A000-memory.dmp

    Filesize

    1.5MB

  • memory/2384-20-0x000007FEF7640000-0x000007FEF7674000-memory.dmp

    Filesize

    208KB

  • memory/2384-61-0x000007FEF44E0000-0x000007FEF44F6000-memory.dmp

    Filesize

    88KB

  • memory/2384-60-0x000007FEF4500000-0x000007FEF4511000-memory.dmp

    Filesize

    68KB

  • memory/2384-19-0x000000013F170000-0x000000013F268000-memory.dmp

    Filesize

    992KB

  • memory/2384-36-0x000007FEF6600000-0x000007FEF6611000-memory.dmp

    Filesize

    68KB

  • memory/2384-24-0x000007FEF7150000-0x000007FEF7161000-memory.dmp

    Filesize

    68KB

  • memory/2384-59-0x000007FEF4520000-0x000007FEF4531000-memory.dmp

    Filesize

    68KB

  • memory/2384-48-0x000007FEF4A60000-0x000007FEF4A83000-memory.dmp

    Filesize

    140KB

  • memory/2384-49-0x000007FEF4A40000-0x000007FEF4A51000-memory.dmp

    Filesize

    68KB

  • memory/2384-46-0x000007FEF4AB0000-0x000007FEF4AD4000-memory.dmp

    Filesize

    144KB

  • memory/2384-47-0x000007FEF4A90000-0x000007FEF4AA8000-memory.dmp

    Filesize

    96KB

  • memory/2384-44-0x000007FEF4B10000-0x000007FEF4B67000-memory.dmp

    Filesize

    348KB

  • memory/2384-45-0x000007FEF4AE0000-0x000007FEF4B08000-memory.dmp

    Filesize

    160KB

  • memory/2384-43-0x000007FEF4B70000-0x000007FEF4B81000-memory.dmp

    Filesize

    68KB

  • memory/2384-42-0x000007FEF4B90000-0x000007FEF4C0C000-memory.dmp

    Filesize

    496KB

  • memory/2384-41-0x000007FEF6500000-0x000007FEF6567000-memory.dmp

    Filesize

    412KB

  • memory/2384-40-0x000007FEF6570000-0x000007FEF65A0000-memory.dmp

    Filesize

    192KB

  • memory/2384-38-0x000007FEF65C0000-0x000007FEF65D1000-memory.dmp

    Filesize

    68KB

  • memory/2384-37-0x000007FEF65E0000-0x000007FEF65FB000-memory.dmp

    Filesize

    108KB

  • memory/2384-29-0x000007FEF4E20000-0x000007FEF5ED0000-memory.dmp

    Filesize

    16.7MB

  • memory/2384-35-0x000007FEF6620000-0x000007FEF6631000-memory.dmp

    Filesize

    68KB

  • memory/2384-33-0x000007FEF66A0000-0x000007FEF66B8000-memory.dmp

    Filesize

    96KB

  • memory/2384-32-0x000007FEF6B30000-0x000007FEF6B51000-memory.dmp

    Filesize

    132KB

  • memory/2384-31-0x000007FEF66C0000-0x000007FEF6701000-memory.dmp

    Filesize

    260KB

  • memory/2384-30-0x000007FEF4C10000-0x000007FEF4E1B000-memory.dmp

    Filesize

    2.0MB

  • memory/2384-57-0x000007FEF4560000-0x000007FEF4574000-memory.dmp

    Filesize

    80KB

  • memory/2384-34-0x000007FEF6640000-0x000007FEF6651000-memory.dmp

    Filesize

    68KB