Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 08:06

General

  • Target

    e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe

  • Size

    4.8MB

  • MD5

    e987477b0d14b6d7075f0105aa28ba92

  • SHA1

    54bb1ac38e517b3adf97ccb38b0d3a8ce71b1fab

  • SHA256

    4fe326571995d0c02e822c70ad842f70b5f217c4a8dd4ed979f196b60711e00b

  • SHA512

    bb6fc302409d60e918d130a48708bd83851b50bda20481436ab65d2091d061e61018617c542cfb8df090f79992ce9393fed2341bd1b8a38af4829a2f4383af68

  • SSDEEP

    98304:8Sis3whP2XB/9Jp3KbjnCDHMz+7ZrrZPx3AqadVQnnPcMj:S92x/vNungMIZfZPx3knQPck

Score
10/10

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\is-6PUHJ.tmp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6PUHJ.tmp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.tmp" /SL5="$8001C,4193427,831488,C:\Users\Admin\AppData\Local\Temp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Local\Temp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe" /VERYSILENT
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Users\Admin\AppData\Local\Temp\is-D13SO.tmp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-D13SO.tmp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.tmp" /SL5="$80018,4193427,831488,C:\Users\Admin\AppData\Local\Temp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Users\Admin\AppData\Roaming\BI Video Controller for x86 systems\fsucenter.exe
            "C:\Users\Admin\AppData\Roaming\BI Video Controller for x86 systems\fsucenter.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ecb9b89c38f93257ef5d1afc23f308a6

    SHA1

    25add4249bf72e2f356c95dac2143e69f93e1b5f

    SHA256

    1ed7b41b2b78c5ee5f8aaace1383395e0a96458ce85180b4155fa262fe47e099

    SHA512

    382767451e5eb343076348bac5f3b025f5078e6882eb1837432e56e618e10b30ab227ae3f7dcbc13bf8ceb93717f4ccaa75156035fb9de726bc17ab89787f25f

  • C:\Users\Admin\AppData\Local\Temp\Cab2B28.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2CC4.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\BI Video Controller for x86 systems\Lang\it\is-2RUJJ.tmp

    Filesize

    5KB

    MD5

    9325aee138a4d9a15d651920fb403ffc

    SHA1

    19eb57cd989571fa8cd426cbd680430c0e006408

    SHA256

    9c8346c7f288e63933ebda42cbb874f76067c48198b01adfb63bccfa11970c35

    SHA512

    d3c0ccf217346e44436ac4f9db3e71b6d2eb152930005f019db5b58dcce923d94007e77fa5b938e182073c2e55163e886853b00e3fc22f135d70854120a218a8

  • C:\Users\Admin\AppData\Roaming\BI Video Controller for x86 systems\libfreetype-4.dll

    Filesize

    3.8MB

    MD5

    96f1c8a9c83fbf6411f35d3de8fdc77c

    SHA1

    41b590133df449c8e0ce247aab7def7cfc39399d

    SHA256

    ae8db0fc9690c6047bd1d1aeb7cd254060c0623700bb184ce3f1b3d1daffc39e

    SHA512

    fa214f15b7c77eca2760aa2489debc5d7244f5535a7b725b49ae7f9ba6f5341a04ee2ccabe15f1e70a542582ed64758d1b4e2d61faaacf2a56e3ec750df76baa

  • C:\Users\Admin\AppData\Roaming\BI Video Controller for x86 systems\menu.xml

    Filesize

    863KB

    MD5

    0ad63807522a2fc76deff4eddbc77d35

    SHA1

    85ba4baf1b1a623bc8fe5ea9334088de8da390c7

    SHA256

    f04362f73243736c636a08982e1f3655ce5824f2e5b0e3e87acbd94d0a906b96

    SHA512

    5cacea66310d6f8fc41cc742d6570e389e9df0f9faec4af2c8d036635500bfcf605148ec0a6e8d54b64485abb8a3881f00e7c93bbe7ab35eec85f39c6c33dac9

  • \Users\Admin\AppData\Local\Temp\is-6PUHJ.tmp\e987477b0d14b6d7075f0105aa28ba92_JaffaCakes118.tmp

    Filesize

    3.0MB

    MD5

    6da8ef761a1ac640f74c4509a3da8b47

    SHA1

    de626da008e5e8500388ec7827bcd1158f703d98

    SHA256

    232fb3aecf0becf95a9d8e820939fb1043a3401d9fd953da7ba13cbab0086ff5

    SHA512

    c9e8c6ae521dbd7e92af06e8a3581835058667ff6b502aa55ff4993c1b639e896c8f3ab6e0ca105e5635a66a40d92b4db96512e2ed337268b76ed611155e2402

  • \Users\Admin\AppData\Roaming\BI Video Controller for x86 systems\fsucenter.exe

    Filesize

    4.8MB

    MD5

    cf8114289d40ec83b53463b1ac8930c9

    SHA1

    00036a509bc31c4264a0414d3386f420854ca047

    SHA256

    39b7e686bb324ecf81adc0b6a165830cd4d3f7d8a2bbba310930fa023f95bb12

    SHA512

    e19af0dcf1aa8253523a1eba1c69f5f26cc63730ef630c60c4ce46d368b037753110426c7e3db333041046dbb04ccffec2bfd48529e1cdaab6547e331df02fc9

  • memory/668-326-0x0000000000B80000-0x0000000001055000-memory.dmp

    Filesize

    4.8MB

  • memory/2216-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2216-21-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2612-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2612-325-0x00000000041E0000-0x00000000046B5000-memory.dmp

    Filesize

    4.8MB

  • memory/2612-328-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/2612-315-0x0000000004100000-0x0000000004110000-memory.dmp

    Filesize

    64KB

  • memory/2720-11-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/2720-7-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3040-330-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3040-10-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB