Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 02:07

General

  • Target

    06956d4e1404512c1b2fbfaaa6d208aa_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    06956d4e1404512c1b2fbfaaa6d208aa

  • SHA1

    7d6ec7f2a07e087ad24895244ae840414d90cb75

  • SHA256

    ee2994270b42614eb65db99369dbe610a5ddaba06322b56c15280d1d5ec76019

  • SHA512

    c00a3fdfa966c5ae739cf8259473606464dc07b30db5ed40feb3ea85c07c2923085183851cd24986d14cacb489ea80f62b18cd8b7850bf2c3171f3a8bef18181

  • SSDEEP

    49152:+23ZMjkAni5NJ44lClN5OVwlwikOZ+L9bgwWdUB8wI5:+8Mni5NJ46ClN5bkO7UB8f5

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06956d4e1404512c1b2fbfaaa6d208aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06956d4e1404512c1b2fbfaaa6d208aa_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\orion.exe
      "C:\Users\Admin\AppData\Local\Tempfolder\ortmp\orion.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\libnspr4.dll

          Filesize

          288KB

          MD5

          74485152d7f2c06fe413f48c7da4ff33

          SHA1

          a07c30fedc80e5f4c2cc0be5202d64f51b015b44

          SHA256

          3c019cb209ba4f01015ffbb628d988735d2c5d9805abd7dd4dab441ea82eb688

          SHA512

          43b3b3bd5d5f3afd845cc79d68e942836f95f708eac96cd84d09b774d8f92f772b2353a273185b6be336603b5b283a486756e95ff26bb1ecd4fe84667cbe6f52

        • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\libplc4.dll

          Filesize

          47KB

          MD5

          08bacf2967fd8ea468c69f6e8d31b914

          SHA1

          eec97e847be6303013e468979b861ff74d4279ed

          SHA256

          2f143cac2efdc21b98620338c6f0404dfce812ee5741960ff68671ed0b0f3a9a

          SHA512

          2550e9481d2604b9c62b97ede184af4a8b2db1333b6707e01bc67b3699f72b0b764a238c86801d4457007e31977a181007f67c300f7c47899d4a771d05c2e97a

        • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\libplds4.dll

          Filesize

          45KB

          MD5

          56c1c79274ef5728b1f50986a5a8f22e

          SHA1

          32f67170194ce27736e564b5328dbab6c4be33b3

          SHA256

          8720171993fc29c517a8124b8235c2c5d71b0ae4c236685ba202088326d780de

          SHA512

          6198edad58ffbb9109c827de704a6d67be44300e7bf11d5af427e568388a9a746ce58e6c09babd65f6cf7dbec9520be6c9d92c7a4724c0892e044c38a9e2ce3a

        • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\nss3.dll

          Filesize

          834KB

          MD5

          9721a913f9a997a62c532d72ed3e7b8d

          SHA1

          2e1f33ec48938eab775f6775e4de93150b39b46d

          SHA256

          4515d073983b96bd48d2601fb22646d72aa56aec163cb172e6d06dd55b8a9e80

          SHA512

          7363b2192a3b0b5f946c14983b197315632907790871dd795b2d995d8cf924d9d3ad7af2c3b465b70f5bb110ba8aaef1412d2cc33bedaeca8c64e2a523678ad7

        • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\nssutil3.dll

          Filesize

          132KB

          MD5

          08b59a1793e8cd6fb085271650f8b5d0

          SHA1

          3182956535052ab496bc92f59167a7e114752b1e

          SHA256

          f0c14914986be4dc13a72fbe509db10a4c24c55e545471d1e4dde2c1d4ca03a1

          SHA512

          e2526879a4904f9e96b5f9422a088bfc4811f5ed3567fd0ad4021c10e6b796df10c61734cf59a2b2b36151fb1451660283284f97d7ff95eb3b78d6340f1cd136

        • C:\Users\Admin\AppData\Local\Tempfolder\ortmp\smime3.dll

          Filesize

          129KB

          MD5

          88f553be556ae62c59b3a3fbea81987e

          SHA1

          166abd59cdf04380b939c3d216b514cbe09735f8

          SHA256

          741bf85f9011be7f57df51a409b9b43b45bed0329d14cedc05d0f84e60c66006

          SHA512

          d27e0ea06245782960bcffd41f9afbd9a7fe3bbb43f15eddbfa083568b21cc6dd15c86686fb597a0bf05d2bb4e76332eb7f28aba82e6a3695423f1458fb924c4

        • \Users\Admin\AppData\Local\Temp\nstAFB.tmp\StdUtils.dll

          Filesize

          14KB

          MD5

          21010df9bc37daffcc0b5ae190381d85

          SHA1

          a8ba022aafc1233894db29e40e569dfc8b280eb9

          SHA256

          0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

          SHA512

          95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

        • \Users\Admin\AppData\Local\Temp\nstAFB.tmp\System.dll

          Filesize

          11KB

          MD5

          00a0194c20ee912257df53bfe258ee4a

          SHA1

          d7b4e319bc5119024690dc8230b9cc919b1b86b2

          SHA256

          dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

          SHA512

          3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

        • \Users\Admin\AppData\Local\Tempfolder\ortmp\orion.exe

          Filesize

          1.1MB

          MD5

          be84f2d7a82cafeaa173428f0370a46b

          SHA1

          d1775cd2bf9da213b013d4b6eabd0e8764a35c0e

          SHA256

          51b3f447940a700e264e0eb0ac4a90e137421a958928bb1ce709534d59990699

          SHA512

          79ce4c7769d1d22fe36b65baad8dc9523e47511a808a5bdcb1620f8c66cacb05f9ecc3a83fdc6a6a859f3402b00705bb0ffae25b4fdd3de6c1abee2eda734575