Analysis

  • max time kernel
    119s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2024 11:47

General

  • Target

    04d4f7bef715293305f3c142b8580fb0_JaffaCakes118.exe

  • Size

    800KB

  • MD5

    04d4f7bef715293305f3c142b8580fb0

  • SHA1

    8e613f82bcc7b3cf5fdc05f9646a3204c07ab6d0

  • SHA256

    fc076806fcdadff211dd630b9ae8738636d18089fe3044c1e2539483170938f2

  • SHA512

    3b6fd78d994d7655ee77d3a5a2addcc5e62c7e0aa0caf3e9f79ce84af84819d47d7070195795bb6f0c97083cf9ab88f2e177a36f8b8aaccd181fa125e09b6451

  • SSDEEP

    12288:ukw1kY6paioS6ZuBMvChOUw2Jmdyhm1z+6kcaOXZQeS4c3sXk2yysSj:TQkYmAzuw26+c+5bWQeS4hk2yFSj

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04d4f7bef715293305f3c142b8580fb0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04d4f7bef715293305f3c142b8580fb0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c cmd < Accompagna.eps
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^HNwvPIFsdWPBGPDIJFlOGWdgktomgKtXFXBbmwgnSfBHXtFAbBDjhrPKbMkLAyeGSSVIgupHdMWscIsunHeMuRJBoQZMQDYNjUPtpWjdaVWBi$" Osi.eps
          4⤵
            PID:3028
          • C:\Users\Admin\AppData\Roaming\Ingannaste.exe.com
            Ingannaste.exe.com m
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2376
            • C:\Users\Admin\AppData\Roaming\Ingannaste.exe.com
              C:\Users\Admin\AppData\Roaming\Ingannaste.exe.com m
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2580
              • C:\Users\Admin\AppData\Roaming\Ingannaste.exe.com
                C:\Users\Admin\AppData\Roaming\Ingannaste.exe.com
                6⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious use of WriteProcessMemory
                PID:2624
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wxrxvfoiwfvt.vbs"
                  7⤵
                  • Blocklisted process makes network request
                  • Modifies system certificate store
                  PID:2040
          • C:\Windows\SysWOW64\PING.EXE
            ping SCFGBRBT
            4⤵
            • Runs ping.exe
            PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a78c744c85617080c2e4ed7c0da55ed7

      SHA1

      f5561d0e11d2286a76840f8fcca3ef1733cc5570

      SHA256

      2b77bfee1920f0ce4af97148221f58346d08c5626fd44ac9bbf27effa87d92ea

      SHA512

      d8c8c929af8abc385bede613dc9b36af878cab37e46ea47eadbaefe02db16f7e5561cd9154609cdcfdf005e917ab52ab13651fb7258c563b12759ca6747aa945

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      71cd9c755df2a3f7ad9f404967b02298

      SHA1

      c8f02fe8f47377937d4745bd1bf55a6fcb3d312d

      SHA256

      04f2d89d1147d0b728af92003b5d33c4d07573770e1bbe370336f66196239fb8

      SHA512

      27723d8b2323c7290a96357b3f27cd6fe5e3535229595d8fafa93baf6c916cede562f8f5c6cee1ec7ac38ab663ad3daaef2b7d20190d545e615269ac8def6a9b

    • C:\Users\Admin\AppData\Local\Temp\5BC7.tmp

      Filesize

      302B

      MD5

      9324d88d2390aab234065f3e63f514fb

      SHA1

      52ea620935c14d26016588d35e5b0b7936b89d82

      SHA256

      29ebdf1aadbf13cc5444a848649d92c8d2696d5cf406796b316c9b518bc424ec

      SHA512

      e6ca38b5c8900e8fb337b41d0f9563260e8966b89c97ee28285550d21f14ffd1cec2a28b17fb7e572d2a978af20fc3fc8e4779857759c8f63a1139c19f5b461f

    • C:\Users\Admin\AppData\Local\Temp\Tar831A.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\wxrxvfoiwfvt.vbs

      Filesize

      145B

      MD5

      d4ae9409ec5140e61dd77cfaae3b61bc

      SHA1

      39bf463c4a4b84327d9b1e5d51a6cd6ffbc9f8b2

      SHA256

      6a6a6bb564cf0fdc7854192f980f95311f21555071dbd617f87a6248538cf5cb

      SHA512

      4461d38aa17363e143b756bb890fbe62fda81d77f37e33fce30c20915a76ee0b59ce50f1699a4a0fc6b69aa0197dd6d78f7e743aa7170cba3a51ca20a7b01e20

    • C:\Users\Admin\AppData\Roaming\Accompagna.eps

      Filesize

      505B

      MD5

      1c1492d685731c098926ed400ecbf718

      SHA1

      e37040ba07e313c7db4b5147a66779227fb34d93

      SHA256

      a0d462824322bde608db6b92f72d914d27cfcdb83716efeb66f8816bfcb7efcd

      SHA512

      14070b0d2e3d5c460864cb34161082581416860d4666ee16e3961a0b0e14ba5e70afccc5ca27d31fbb0a9093f22581d32b4b156a612859001918ca3ebd9dc19a

    • C:\Users\Admin\AppData\Roaming\Eravate.eps

      Filesize

      932KB

      MD5

      4e63e14a1a0e110450ad93a9cd08f269

      SHA1

      69ef8982145d99f52f13563147fdaa387d5fa10c

      SHA256

      0e9926422d584c97cc70c83a395eb20af79c1a485edeb44e564ba7a26cdd5bf2

      SHA512

      3445311db82ce461c810e570a9e4b00f11c6a0fa508ed4bbf9f89369132740ce43f828fa4f7917ac764e683aed5b89db3989cfdd552b0f1b2038f2540204fae3

    • C:\Users\Admin\AppData\Roaming\Osi.eps

      Filesize

      872KB

      MD5

      cfe7a33fd6a2e271b311a32a500da0d0

      SHA1

      2b5b2aa99e983c7a655c185080e8262a2f38f600

      SHA256

      285a500bbee93867ce01ba4c43c60682586fde30653928e1a888013593880211

      SHA512

      89475b2a8e4e4b9c9370250f55424c30257794ac66a870c28a67c88086801512852c7dad123e7df7804d88481b0cc571fc6d0ffe7e153283beac2e3c2fcfd367

    • \Users\Admin\AppData\Local\Temp\nsiFE9.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      09c2e27c626d6f33018b8a34d3d98cb6

      SHA1

      8d6bf50218c8f201f06ecf98ca73b74752a2e453

      SHA256

      114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1

      SHA512

      883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

    • \Users\Admin\AppData\Roaming\Ingannaste.exe.com

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/2624-32-0x0000000000080000-0x00000000000A7000-memory.dmp

      Filesize

      156KB

    • memory/2624-29-0x0000000000080000-0x00000000000A7000-memory.dmp

      Filesize

      156KB

    • memory/2624-27-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2624-26-0x0000000000080000-0x00000000000A7000-memory.dmp

      Filesize

      156KB