Analysis

  • max time kernel
    27s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 17:50

General

  • Target

    c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    c8c7f4bdab4a2303fa119e82320e8421

  • SHA1

    bd861293a5e55b955061d570a8238ebce45500f5

  • SHA256

    bd19e4a3a3211b73ff50ad732aa4357deb68f37954f8c492eca99a6f5311c0f8

  • SHA512

    00ea6f93603ed1fd77c10a67f6c2f0f0ce146e30a8b9fe5dc8e3216c247a015527654e591fc0820ffdb213cf8400c31f9564cbc361e05dbb762e15f1891b992b

  • SSDEEP

    24576:y1jIhSyps3Nb/aP0c4Tw8I12wmUqUaUJcMqvs:6vnUk

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe
      c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe
      2⤵
        PID:2540
      • C:\Users\Admin\AppData\Local\Temp\c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe
        c8c7f4bdab4a2303fa119e82320e8421_JaffaCakes118.exe
        2⤵
          PID:3008
        • C:\Users\Admin\AppData\Local\TempOpen AutoSwitcher.exe
          "C:\Users\Admin\AppData\Local\TempOpen AutoSwitcher.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\TempOpen AutoSwitcher.exe

        Filesize

        44KB

        MD5

        ffc3cf2f6b6ed7f7828b5f543b2ac6c0

        SHA1

        8b1fc7d5215d460c23b0aebf815a8da3916dcbea

        SHA256

        49c21fd6414e34d6b2a2e73e6288b942bddaf873919a2ee90ac52d21f372b5b9

        SHA512

        5eeffa259ef012a953c290171b3ab74e4f3399ccd2ebdb0cac4ca0159a67d6f60e2dcafb46ee33b1ef84f647f3dc782a20361a79dc08a240b6cf22edc2da1e79

      • memory/1936-0-0x0000000074D11000-0x0000000074D12000-memory.dmp

        Filesize

        4KB

      • memory/1936-1-0x0000000074D10000-0x00000000752BB000-memory.dmp

        Filesize

        5.7MB

      • memory/1936-2-0x0000000074D10000-0x00000000752BB000-memory.dmp

        Filesize

        5.7MB

      • memory/1936-13-0x0000000074D10000-0x00000000752BB000-memory.dmp

        Filesize

        5.7MB

      • memory/2588-14-0x0000000005440000-0x0000000005442000-memory.dmp

        Filesize

        8KB