Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 23:08

General

  • Target

    e8a5429c19fa9ca63f1ad33cc4cb4818_JaffaCakes118.exe

  • Size

    194KB

  • MD5

    e8a5429c19fa9ca63f1ad33cc4cb4818

  • SHA1

    e8d2e1d20838e56809a6b9d1bc2d6bcd7a851520

  • SHA256

    739737567f6feb4f680fcc50481a236212f8080d86d209694ca0a859827cf69b

  • SHA512

    d127463f6b3b73e6a58fddc28c3d3b15f8065da5e85cc086e6f568a0530ccbbe75f0458e4196496c744e2a1a492497d0f307199ead0dd51213d2743cfa22f6eb

  • SSDEEP

    6144:84nf5DAzvOTKJxK/bukwSKuokes7F7Tx//:Ff5DAjOKJxK/lKXkec7R/

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8a5429c19fa9ca63f1ad33cc4cb4818_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8a5429c19fa9ca63f1ad33cc4cb4818_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\set.exe
      "C:\Users\Admin\AppData\Local\Temp\set.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2616
    • C:\Users\Admin\AppData\Local\Temp\GLJ5774.tmp
      "C:\Users\Admin\AppData\Local\Temp\GLJ5774.tmp" C:\Windows\System32\pwfsh.dll
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2552
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
      PID:2136

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recycled\~GLH0007.TMP

      Filesize

      72KB

      MD5

      a4d86b727bd44c30a0ef7ab555aff055

      SHA1

      f3747d583417b8f38fa719b4c7f8dd9225f30849

      SHA256

      f87fa66c2af10b4049222993be312f4cd28b7325a1700d282ad7e5d1c5cee958

      SHA512

      640df3f428bcfc4dc0e57dc06b18b5dac0463415ea0472c25c14ea8c13151468bcd211f694bafab7174df9c6064e3fe5dd419c72eee92238d463e0b6ae3df1cb

    • C:\Recycled\~GLH0009.TMP

      Filesize

      20KB

      MD5

      2b661446b08cdf55521638aae8c62d81

      SHA1

      01e24f5801293b4525dcf7a6b32e625cbecf0bdb

      SHA256

      547f4806481f731ccaa54645609a72b4d1051aa511325c9a739a3cb30d50f74c

      SHA512

      d72fe8b7bbb42b719ff49b27eddeef187e8da78de1ca93bac548d45877ff50cff5da4219ee2dc3a678074a94897dea80a6f2427543abbd8927d5663cdb1177b7

    • C:\Windows\kentgo.log

      Filesize

      108KB

      MD5

      a68c0c80770607bd0fdc9ff8bfdbcb60

      SHA1

      c0873a1a5ec7dc4daef758b6ee4d16abb07bd574

      SHA256

      1af499e6e40597f157fb64242a75570d0f675e53e756c3bf3941a4e32791fc83

      SHA512

      01c04ec100805a576b7edf1484ed01c509d47c3ce52ea1fb230ab19f4de843dc5019330d9a1d94858757525fb4af78e00976bbe9b83c093717ac8ecdc4d67dda

    • \Users\Admin\AppData\Local\Temp\GLC5754.tmp

      Filesize

      161KB

      MD5

      09e59d00df5d2effd8dd9b30385cb9d2

      SHA1

      0fa0d3f6692f31fdabefb719b0f7a28cbf5d5415

      SHA256

      1c574eab5e83ccfe5a0bb7b59e028cc5fa2f4e77868051e305d83c709711ff77

      SHA512

      d73e3832777341a4176dbd9988002ec94a32f162492e869a8c03d9bb10f1833821f99e15710e9fc103a2820c862cf14a0b990d7c7c09150bb14618a7c93ca5fd

    • \Users\Admin\AppData\Local\Temp\GLJ5774.tmp

      Filesize

      2KB

      MD5

      6f608d264503796bebd7cd66b687be92

      SHA1

      bb82145e86516859dae6d4b3bffb08c727b13c65

      SHA256

      49833d2820afb1d7409dfbd916480f2cdf5787d2e2d94166725beb9064922d5d

      SHA512

      c14b7ec747357c232f9d958b44760e3a018df628291e87de52b8174ccc4ada546eba90a0e70172d1db54feca01b40cd3aeaa61b8a2b6f22d414baad1f62e8e54