Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-04-2024 01:07

General

  • Target

    ec5e7e3130e74b990c0be814058118bf_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    ec5e7e3130e74b990c0be814058118bf

  • SHA1

    7e735e485321f9260007b1fe86b81ad514374987

  • SHA256

    b38a4554e2730f5a5b5d42d277908de268e2a1b7297347296e34fdecbaa81d0d

  • SHA512

    a03111c766d4c00560b1b4b635c57f6c05a704dc44c30f86315a1894c57a8e4c0852fc4f05a85184eb682fbea81ec9239098384ea569835800a26f93f5194ad4

  • SSDEEP

    768:Y1QNQMBO3Mqe9KZb0LB+8vGMRXyonbcuyD7UURfUJLJAnbcuyD7U:aQGeO3MB9KeY8vGMRXfnouy8z4nouy8

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec5e7e3130e74b990c0be814058118bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec5e7e3130e74b990c0be814058118bf_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\sbsm.exe
      C:\Users\Admin\AppData\Local\Temp\sbsm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\sbmdl.dll

    Filesize

    10KB

    MD5

    d8722caacb60c2c3405320541dcd9242

    SHA1

    438fa00ccfc621ac59094ad5037c823ebbe1be53

    SHA256

    9bb01dcf2caea54ed2506d90b44dbafb75d436c5e1ec10540d60abace87601bf

    SHA512

    9387a62278a8c9e4bbbc737956800447a7609f043b84974a57f63e427816e6736f16c3dd8150b564a386331f00917e83f78ded4e98f932e19c4caac1842ae489

  • \Users\Admin\AppData\Local\Temp\sbsm.exe

    Filesize

    5KB

    MD5

    fe1e8993dbb83d60527b486a462392f5

    SHA1

    d08dac8a5bd208a73a5cc2053a15103ce6f46fd8

    SHA256

    284db6666091c2922d05651e46057a8960bd3e555e9f1a9ab623ad771aebf4f6

    SHA512

    2fc991dbca9a3f0db7a0b5d18c4045165ed345984c0f67801be4124455b33b5498968311044897910cd80dd6ad33dad2e4face3af0ca795d6be883c1be31fa89

  • memory/2956-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2956-4-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/2956-13-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2956-14-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB