Analysis

  • max time kernel
    0s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 00:38

General

  • Target

    dc396cf4fc67f6b1e9b480fa5e348d9d_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    dc396cf4fc67f6b1e9b480fa5e348d9d

  • SHA1

    ec39cec64f3a3a0caf70c56f908e1e43b05dfd33

  • SHA256

    1c6c59c7e8d7500207ab504c4d97733827173403c0021fe683172a9356861ad6

  • SHA512

    7ecbd34bb787e44ec3a42b9503b49ffa4f9d23509005584dc9399336cac91cef83ea10e370f6887001393d28a101bf2769d319d4e32678ec29fa9ffd9178791a

  • SSDEEP

    49152:Ifc7l/9/T9viisA7XfTDEU7tPvGiQXf98u1SihwpNddKFNabziMBLRdcRBI48ejU:DxBTcwPnEst2vPvoihwbiFNaaMlYu4XU

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc396cf4fc67f6b1e9b480fa5e348d9d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc396cf4fc67f6b1e9b480fa5e348d9d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\302427~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\302427~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\302427~1.EXE

    Filesize

    129KB

    MD5

    67f265570fe70cc84e422ff18d8575d5

    SHA1

    731c65e6bb6c202b72658126c629687f73520b46

    SHA256

    dec2b783f83d6ed3dcbfa6d5f3c30189f555ab7a3a5166b9ebf715d852475b4b

    SHA512

    cf376fd3c15ffb7f01d24ca4b03aa0150386ce03420700e3dd70c10bf6ebc0b633d60df1d785fba167004f4a80a0f50690da950a842e42d5904d7983263df371

  • memory/2328-13-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB