Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 20:20

General

  • Target

    c439cc419562f1d2552a91e62b33be31_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    c439cc419562f1d2552a91e62b33be31

  • SHA1

    26210975dbd42dd02290794a9400c44a64b9bd74

  • SHA256

    be6424c75717ea73b6233777c2f8c4c3c98e48e13607f5ab049c1d8426bf1833

  • SHA512

    26b9e33db41e7d821a3470e9166aeae6ae37485bbf9f16d682408f83bc15a47bff4845c6214f8fd6654f1b7fd25d34a8c617a37f6cfbf1c7cc81e1c189d476cd

  • SSDEEP

    49152:yw1P8clUXcQPKkUwBFA2XhB2/Dy9BoR+Jmq1Wayp4awkhPJWb:FEclYcQPKk46o/u+ibysc4b

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c439cc419562f1d2552a91e62b33be31_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c439cc419562f1d2552a91e62b33be31_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Seemao\app\seemao\seemao.exe

    Filesize

    423KB

    MD5

    de05c53fe65bb42614efb70622c12fef

    SHA1

    94bdd50e7b4371fbe1e22d3884d1589be30fc0b0

    SHA256

    bd05dfc2c76417676518b44d14e0f17334bd63a1a8d4b236504ac741a3171f31

    SHA512

    98c6be6d9ddd92992c519fcb839be57a972f50c3986172b15a45f24c605f3ad563ac6b9f1efe0377a7bad47fd43ef41b091f7a3e575bc8e1783bdf122b6b6a68

  • C:\ProgramData\seemao\config\map\www.shihui.cn.html

    Filesize

    2B

    MD5

    54cafa3a6d69c189cf2df3978fbdd435

    SHA1

    ab34955f0a30619fc4faa49013902031d85ddc46

    SHA256

    e12a7e051731cf1dbeefa2142a8e1abb1eb5898e2cbe4aa522120829a5588dc7

    SHA512

    43e539801d00eb39811341d67327e0e8b7d97677e08c8cd14d501c1276592a80dcc0983306f292c702a7553d34bad9fa768cf9d046059c3a4b2a1a0a892f9410

  • C:\ProgramData\seemao\config\map\www.xinhuabookstore.com.html

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\nsm8B97.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1