Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 15:38

General

  • Target

    fd185630944384dd09cdd36183680843_JaffaCakes118.exe

  • Size

    986KB

  • MD5

    fd185630944384dd09cdd36183680843

  • SHA1

    03e0d1d4a83fd7524a1188e4d903c55758b39873

  • SHA256

    4d474f2446a19534f555ddae0e563a4a5f24d8c3792f64402386c2a2d5bdecbf

  • SHA512

    cc0542a65765de2c5259162e06c35d415967840663fcb2f9d0467d9df792b16e79dfae45d9fa1970f10bd60abefa0dd289227056525f96f918eff8e40bb61ac6

  • SSDEEP

    24576:FMYpZTbD+LLwTVujH88kC1xTti9wuyECfKR/kZZ2QOKc9Yuz6hn:ta/uKkC1xmnpTQOK4zzCn

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 64 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd185630944384dd09cdd36183680843_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd185630944384dd09cdd36183680843_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\temp\2049.exe
      "C:\temp\2049.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Users\Admin\AppData\Local\Temp\2049.exe
        C:\Users\Admin\AppData\Local\Temp\2049.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\ProgramData\Application Data\Microsoft\IEHelper\2049.exe
          "C:\ProgramData\Application Data\Microsoft\IEHelper\2049.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2480
          • C:\temp\tool.exe
            "C:\temp\tool.exe" 2049
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1436
    • C:\temp\102600.exe
      "C:\temp\102600.exe"
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2636
    • C:\temp\10059.exe
      "C:\temp\10059.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\temp\Loadam.exe
        "C:\temp\Loadam.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1776
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\temp\_deleteme.bat
          4⤵
            PID:3048
      • C:\temp\wd2_051117_WIS271_mini.exe
        "C:\temp\wd2_051117_WIS271_mini.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\SysWOW64\spoolsv\spoolsv.exe
          C:\Windows\system32\spoolsv\spoolsv.exe -printer
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2460
      • C:\temp\newweb10296.EXE
        "C:\temp\newweb10296.EXE"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        PID:2448
        • C:\Windows\SysWOW64\mssv.exe
          "C:\Windows\System32\mssv.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:1760
          • C:\Windows\system\java.exe
            "C:\Windows\system\java.exe"
            4⤵
            • Modifies firewall policy service
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            PID:1480
        • C:\Users\Admin\AppData\Local\Temp\GLJ18CF.tmp
          "C:\Users\Admin\AppData\Local\Temp\GLJ18CF.tmp" C:\Windows\System32\WinSC.dll
          3⤵
          • Executes dropped EXE
          • Installs/modifies Browser Helper Object
          • Writes to the Master Boot Record (MBR)
          • Modifies registry class
          PID:776
        • C:\Windows\SysWOW64\mssv.exe
          C:\Windows\System32\mssv.exe /REGSERVER
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:952
          • C:\Windows\system\java.exe
            "C:\Windows\system\java.exe"
            4⤵
            • Modifies firewall policy service
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            PID:844
      • C:\temp\boba_super_update-1.0.0.1_Ete_067.exe
        "C:\temp\boba_super_update-1.0.0.1_Ete_067.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        PID:2556
        • C:\Program Files (x86)\pcast\PodcastbarMini\update.exe
          "C:\Program Files (x86)\pcast\PodcastbarMini\update.exe"
          3⤵
          • Modifies firewall policy service
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2756

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Browser Extensions

    1
    T1176

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\mssv.exe
      Filesize

      50KB

      MD5

      58c31ef011ea353ec924c8f91a34b981

      SHA1

      b917431def52a690069dadc13375a441d17ce06e

      SHA256

      8c297d226b830d158a280d7e74b47e0d209725bc6a005947e4170c33335bf63c

      SHA512

      e2a0469454fcfa80f7bbcf0ba1ff4e9314976adcfb201b05bad572042c21ef63a104d3f031bc38d70431c4edab8c803357a9358611d6f4c95c87303de3feee6c

    • C:\Windows\SysWOW64\spoolsv\spoolsv.exe
      Filesize

      44KB

      MD5

      ca0e9f2948604660bd94d012d65d24a8

      SHA1

      1ee4af187b318ec7b22209438888dba1e6dafa21

      SHA256

      31134e2b466db1ce8241221e3c6b9ac3055dc2a26e8838d10444c75e5fa7b2b3

      SHA512

      8cf669980e942f5b98a5d580df1eb927fb093c3cb6ed4271b5f6850c1631d860986cc0c6968b3468c5265b7e67e65ced31763c9baf10e1d807ba1b4673872cbb

    • C:\Windows\system\java.exe
      Filesize

      18KB

      MD5

      36a095c8f8c7ffddd39be5d43f62e596

      SHA1

      c923a9cf3d48d1d50eba0b9517faa5141cca2656

      SHA256

      6254b2b677c0816b70d4e90df7cf8ab7b3ed1b7126de21872b285cc4a36dfa5b

      SHA512

      e0ce714fbc921ceaf542920e2c493aa58b745359d89b768eaedeb1133f2daea4338ea13f1909a1e7977dca85c2b3467191436a36f96d8385c3d2b55cef4112da

    • C:\temp\10059.exe
      Filesize

      133KB

      MD5

      7c3c75cf5418ed7b1c3710c7a7741bc5

      SHA1

      b934eaab7626a3c9eac0d205eb008fe43d4fdf93

      SHA256

      04c12ccc87fd1b6dbc0906fc1c6cc039747c232bcc507d0a72da32a66279c02d

      SHA512

      90bcd2c3a6be99b4f033d53b473a64c53c6dd33efcb2664bec71844646e266696e827f4d1d7dd6ad7f3d5fc6cca2397b287121444b8d5e192f1be88a4a997de8

    • C:\temp\2049.exe
      Filesize

      280KB

      MD5

      29e6687bb514f1397033b085d18fe240

      SHA1

      5f503609bb3ddcdfbf852ea3cbd5aa540700e88c

      SHA256

      79e31119bf7adf533b0c45482df7ec8519a9a4ec9f01d1dc25a87c2dae4455fc

      SHA512

      7bddc4493956fa33eee877ef1c73289d977341489ea2b049b96582d3c1f8fbd6918d07076b039a98fef71486b78e6944073bd5e44ce12877d52c2bcefbaffd6c

    • C:\temp\Loadam.exe
      Filesize

      18KB

      MD5

      fbf214cc6f86b2ba6f87c7c6c6cf5f90

      SHA1

      18e7b59d4758720c5f1dfe983a6bd3d40c7cfc27

      SHA256

      c871aabbbdc4a8b9b6970ed2b8bd75bb39df57a2a81510223137c9e6a9701bac

      SHA512

      c58df78a0547f845dd1387c3ec9afd467615d7427c63a9b97b82b39976de9faf8be0459176299ec129fbacf23e80efca52250c1d77f78226f5c77b909f5c5c29

    • C:\temp\_deleteme.bat
      Filesize

      80B

      MD5

      6c856dbd1ce1fffa9e5ac768bd5978ee

      SHA1

      6afe6336441923db24ff1e2d044eb4f5b2501a27

      SHA256

      c2b12d0da599982e1a8b6c2e6759e0310b982689a0ca2326da6632bdce4ecc99

      SHA512

      78fa4a16d36483046bd796c177ab552d0271f7094b6067eebdcf318bb659bdd9fb461de428c489ba06aa03ae51f84dbd278d67a09c267b24cda52a6a25aba74e

    • C:\temp\boba_super_update-1.0.0.1_Ete_067.exe
      Filesize

      116KB

      MD5

      21e50a12f2ecce19405cfc90ff79c811

      SHA1

      ade2b1b95843016f0661890683e82e20a45b6c35

      SHA256

      bdbbcea503538e65772dcb66b55025281619bddfe20fc2faab73036dff5fc1fc

      SHA512

      c1191ce1350fbcaf9640e1d6cf9611926f834e18663d598c5748fa779dcf2c44e5c83e697bdc314f99224f4002c615f187b73b8df8ee551f7d733cdc85867907

    • C:\temp\tool.exe
      Filesize

      328KB

      MD5

      84bc69fd23dd51b304ae9aaa8d67aed0

      SHA1

      a6b3d198e0204ae8b2aba3a6d6d9eb5c11b84730

      SHA256

      09619b393ef1fd850f7c108baf0303910b20465ef7ff8298c050dc138f059c40

      SHA512

      019bb109fa45a00593ce4d0cc28cb812cedf016b3bae33c077820913692e1e7da52d8341def987e2184c9da93738aa4b63d8385dd54d94fdaf081de786d885e3

    • \ProgramData\Microsoft\IEHelper\2049.exe
      Filesize

      241KB

      MD5

      cb24df5cf2818f8eca7deab6b975ce60

      SHA1

      23c4d476fb62f2396af34f03af0ad3ec2abe7e10

      SHA256

      f13fa77ec679e8d14424eabf76384175f8abe1838f1b4b4def1ff8b7f29e26a0

      SHA512

      dfb47bc35d7e2b361e8aac899b778b1c0277a58aa8b2228405c1f2c6d6bb6d938f31b4f831eab1fc359d7b519f156d5efbc7431528c6a6ee2e54541885bf59ea

    • \ProgramData\Microsoft\IEHelper\IEHelper_4769.dll
      Filesize

      108KB

      MD5

      06f3eb60f97b7285996e8c7682f0d7dc

      SHA1

      6598e7df5afb8cabb228bd0cfad8643466fc5b57

      SHA256

      d4ce102c0395a226438a579a4d9136f49594464569b08c6d98e87d2496878a2b

      SHA512

      3b13215d49b790bcd50e9ca64df46c9006e09533452f87cd809b304f814a9de13b135d95bf33f93df7412e37ff69cff66910c64f2893a5217cdcfab65f595b0a

    • \Users\Admin\AppData\Local\Temp\2049.exe
      Filesize

      400KB

      MD5

      c950e0f69f9aeb954397d6e5f0abd9e5

      SHA1

      71fc73100d6fe26a8c982a501c6a69186bad779f

      SHA256

      d96561eb92dbfd4707aa7e3f962de7d34bf40462b7c5ee135e699e29bb2a52f5

      SHA512

      fe8dd8180e57f6a2bc6b067d489c89dea2782dc158886d3860ed2a2d2bb86f6bbbee8f6d2d8411e20996f664295ab4b54355fa451dda67e82df1491e8d4f488e

    • \Users\Admin\AppData\Local\Temp\GLC1890.tmp
      Filesize

      161KB

      MD5

      8c97d8bb1470c6498e47b12c5a03ce39

      SHA1

      15d233b22f1c3d756dca29bcc0021e6fb0b8cdf7

      SHA256

      a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a

      SHA512

      7ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f

    • \Windows\SysWOW64\msicn\msibm.dll
      Filesize

      244KB

      MD5

      ce7b6e0fed62052f6690bc8ae620081f

      SHA1

      cd8f10864cc113ff459a8150c6e2f6cc14b5ea52

      SHA256

      d761e1d2fb377edb44eb791a402dcb89ffebce185d5ff127bec9128bb023d496

      SHA512

      65e45866d9d0f27209a328aa2463c144c3c593a79954dfaf5662c53cb14f925dc6fc297a73e8e0fc353f9bf5439cacdd523fc768324d96a5836a8d8fb8a65477

    • \Windows\SysWOW64\sysreal32.dll
      Filesize

      68KB

      MD5

      03c68a64818522069dd56aa362184adb

      SHA1

      1f70d299051f70989d83054a4177108d4d371b71

      SHA256

      f82c5969d02117bb94373f36c5c25bebdfb9af9eb014ae233bf14d4b6cd49aa5

      SHA512

      c5c6d985ebbf80480191e9b063847bd41edad21dea684c009d023256bd5e9f150e6246519f52abc9e20bf1f6d2d1c0417232a0babd0477ca1038a23f6b9fc64a

    • \temp\102600.exe
      Filesize

      56KB

      MD5

      ad4b5a89f671f284b43ea2a7cb4a42c1

      SHA1

      c45197f33eb11dda04d5c4fe5fa56eb57f51f651

      SHA256

      ad2fd6de49c88884aa690445e80d20822147c6510e3664a6b419b10e0259a1a9

      SHA512

      8176483f516da5c1ffa97817fd6ce3bac1180116de3d44b2f245b65c5b2969c4e1ef00b88a9fa868ef317e0f5f7b9b458348ea9efea5b9a3072f28b843cfc71c

    • \temp\newweb10296.EXE
      Filesize

      244KB

      MD5

      f7331eb6c0d009dd7afb48a93a212166

      SHA1

      9bcfed872960b4f19500d5fb4fe02fcd1c2e5ffa

      SHA256

      0efa60dea2558717c5a1a29e85f9e63dfb0127dbf52bd4b9176917a23edcc5a1

      SHA512

      69a3888504819d19c81490b2ad8b5dd1dfb450ebd39016131ed87c4f549d2dfc10c2bb1e98b0206affed1759da814e82c8d9470f9ebfcffaca89b5a9541265e2

    • \temp\wd2_051117_WIS271_mini.exe
      Filesize

      196KB

      MD5

      31313ee73d01379633db3470c72c7e79

      SHA1

      e091e1a5292d82f7939c6d8e2cf914541eff6f1c

      SHA256

      8fefa20fd0ebf82a7541baf0f82aa65e0687cb6bb2be68c322341309c8cac4c9

      SHA512

      e99d5132da10eab4bf7abc31a55f753980e6e6e38ea8d748f20ad334568ae1e4b405dddd22854b0a2b0e0b5b4cfac235e28282d859b6c295a98b8e65df886721

    • memory/776-215-0x0000000010000000-0x0000000010043000-memory.dmp
      Filesize

      268KB

    • memory/776-190-0x0000000010000000-0x0000000010043000-memory.dmp
      Filesize

      268KB

    • memory/844-196-0x0000000000020000-0x000000000002C000-memory.dmp
      Filesize

      48KB

    • memory/844-214-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/844-197-0x0000000000020000-0x000000000002C000-memory.dmp
      Filesize

      48KB

    • memory/844-195-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/1480-192-0x0000000000020000-0x000000000002C000-memory.dmp
      Filesize

      48KB

    • memory/1480-193-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/1480-191-0x0000000000020000-0x000000000002C000-memory.dmp
      Filesize

      48KB

    • memory/1732-151-0x0000000000250000-0x0000000000252000-memory.dmp
      Filesize

      8KB

    • memory/1732-207-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/1732-65-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/1776-206-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/2480-160-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/2556-153-0x0000000000400000-0x000000000049C000-memory.dmp
      Filesize

      624KB

    • memory/2636-211-0x0000000000230000-0x000000000026E000-memory.dmp
      Filesize

      248KB

    • memory/2636-209-0x0000000000400000-0x000000000043E000-memory.dmp
      Filesize

      248KB

    • memory/2636-163-0x0000000000230000-0x000000000026E000-memory.dmp
      Filesize

      248KB

    • memory/2636-164-0x0000000000230000-0x000000000026E000-memory.dmp
      Filesize

      248KB

    • memory/2636-212-0x0000000000230000-0x000000000026E000-memory.dmp
      Filesize

      248KB

    • memory/2636-161-0x0000000000400000-0x000000000043E000-memory.dmp
      Filesize

      248KB

    • memory/2636-210-0x0000000000230000-0x000000000026E000-memory.dmp
      Filesize

      248KB

    • memory/2872-154-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/2936-83-0x0000000003570000-0x00000000035AE000-memory.dmp
      Filesize

      248KB

    • memory/2936-67-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2936-24-0x0000000003560000-0x00000000035E2000-memory.dmp
      Filesize

      520KB

    • memory/2936-1-0x0000000000820000-0x0000000000846000-memory.dmp
      Filesize

      152KB

    • memory/2936-2-0x0000000000820000-0x0000000000846000-memory.dmp
      Filesize

      152KB

    • memory/2936-0-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB