Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 15:34

General

  • Target

    ef77ba9ee6a9e2800860724eb9baba03_JaffaCakes118.exe

  • Size

    131KB

  • MD5

    ef77ba9ee6a9e2800860724eb9baba03

  • SHA1

    8fb2d3bfe841a17d2071515aa2b74cb3564b347d

  • SHA256

    889e674614c4135997d1af3657a6093fdc036e78ce03b93a42cd8f8e47a5a946

  • SHA512

    3c32bfd23fe0eb271fa0c551e3677e28606012436d07b1a65fdaa363bc44fc5f6ce1b485e7059c35b08f37d7f64c8ef13e470353f7172ae820f8e704340916fa

  • SSDEEP

    1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjKV:xPd4n/M+WLcilrpgGH/GwY87mVmIXl

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef77ba9ee6a9e2800860724eb9baba03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef77ba9ee6a9e2800860724eb9baba03_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe
      "C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe
        "C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"
        3⤵
          PID:2836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe

      Filesize

      131KB

      MD5

      dedda0d1802a3c68e84340aea8b0ee7d

      SHA1

      9060c4ca08d5abd88805b92d9fba7721290b585b

      SHA256

      83c05b25327fa297342c5c250b5cf8b55709410bcd22c8714ac91083dd5ac159

      SHA512

      853017e24b610f4deeba6631d24ac070aa68b1bac2f6363cce1097e76d86dc86671a4491c4784e331fabfecd2890923d9cb82adf3e1b96213e7cf2cd6a9f44dc

    • memory/2892-14-0x0000000074490000-0x0000000074B7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2892-13-0x0000000000090000-0x00000000000B8000-memory.dmp

      Filesize

      160KB

    • memory/2892-15-0x0000000074490000-0x0000000074B7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2892-16-0x0000000074490000-0x0000000074B7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2892-17-0x0000000074490000-0x0000000074B7E000-memory.dmp

      Filesize

      6.9MB

    • memory/3040-0-0x000000007449E000-0x000000007449F000-memory.dmp

      Filesize

      4KB

    • memory/3040-1-0x0000000000BA0000-0x0000000000BC8000-memory.dmp

      Filesize

      160KB

    • memory/3040-2-0x0000000074490000-0x0000000074B7E000-memory.dmp

      Filesize

      6.9MB

    • memory/3040-3-0x00000000009C0000-0x00000000009E0000-memory.dmp

      Filesize

      128KB

    • memory/3040-12-0x0000000074490000-0x0000000074B7E000-memory.dmp

      Filesize

      6.9MB