Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 11:59

General

  • Target

    1791f9961bf2f47483340dbf27282628_JaffaCakes118.exe

  • Size

    401KB

  • MD5

    1791f9961bf2f47483340dbf27282628

  • SHA1

    e0595377579cd093ff5caa8bdab5893094d294e5

  • SHA256

    8fc177801ebf737d388b516947106943c8bd3c6b4b3c1ed72486621b617cc397

  • SHA512

    c6e81d0c7389e785d2be6cdafce36bc7c536a983ff178f4bc6f85ea3587ea77336c4db4bc6d375bd0f155b218c3dac65f0f74847f3c0a6b3db6c4f9b83feadf5

  • SSDEEP

    12288:iOn6slzSR6croLZLontmIEGhmdyegN5KD/k:iOn6s06goLkNAPe

Malware Config

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1176
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1204
        • C:\Users\Admin\AppData\Local\Temp\1791f9961bf2f47483340dbf27282628_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\1791f9961bf2f47483340dbf27282628_JaffaCakes118.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\SysWOW64\nslookup.exe
            "C:\Windows\system32\nslookup.exe"
            3⤵
            • Sets file execution options in registry
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:68392
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              4⤵
              • Modifies firewall policy service
              • Sets file execution options in registry
              • Checks BIOS information in registry
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Checks processor information in registry
              • Enumerates system info in registry
              • Modifies Internet Explorer Protected Mode
              • Modifies Internet Explorer Protected Mode Banner
              • Modifies Internet Explorer settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:68516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\win.ini

        Filesize

        517B

        MD5

        893cae59ab5945a94a7da007d47a1255

        SHA1

        d4cfd81c6647ca64022bd307c08a7fb4bbbd4c06

        SHA256

        edfa0f2d3bea9f737e0315971c6f81d3d8e7d460b60a19351ada0316a093c938

        SHA512

        d66e454781f54f45df814ad32d687b0f100578c2a4ffca62de81add04281fb881a550702bd2d058933d3736d14e88624af268a86ce24b0c3935242b206ffdcc9

      • \Users\Admin\AppData\Local\Temp\fireguard.dll

        Filesize

        69KB

        MD5

        0b5dbd2725bc7b0697f9ddeab360920f

        SHA1

        5b3feef13a8932f40cb6a55e6ca0df39cdc731b3

        SHA256

        eed5d36879e2d0bee35d885b9546772c00d3f34115c4e23916cccfe87e33ea82

        SHA512

        773a51541bd7c5f6ee1817b78ad156a8c81c060bc030a0b1f232ddcecabc873ae06b46fd038d44060ad283fd27137ef67854e18fd611157e828b5d8c0b5a6ac9

      • \Users\Admin\AppData\Local\Temp\nsoB78.tmp\System.dll

        Filesize

        11KB

        MD5

        fbe295e5a1acfbd0a6271898f885fe6a

        SHA1

        d6d205922e61635472efb13c2bb92c9ac6cb96da

        SHA256

        a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1

        SHA512

        2cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06

      • memory/2308-13-0x0000000001E30000-0x0000000001E3B000-memory.dmp

        Filesize

        44KB

      • memory/2308-103-0x00000000004B0000-0x00000000004B1000-memory.dmp

        Filesize

        4KB

      • memory/2308-104-0x0000000001E20000-0x0000000001E21000-memory.dmp

        Filesize

        4KB

      • memory/2308-100022-0x0000000002730000-0x0000000002738000-memory.dmp

        Filesize

        32KB

      • memory/2308-100023-0x0000000077890000-0x0000000077A39000-memory.dmp

        Filesize

        1.7MB

      • memory/68392-100034-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/68392-100042-0x0000000000300000-0x0000000000301000-memory.dmp

        Filesize

        4KB

      • memory/68392-100026-0x0000000000090000-0x0000000000095000-memory.dmp

        Filesize

        20KB

      • memory/68392-100027-0x0000000077890000-0x0000000077A39000-memory.dmp

        Filesize

        1.7MB

      • memory/68392-100058-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/68392-100036-0x0000000000440000-0x00000000004A6000-memory.dmp

        Filesize

        408KB

      • memory/68392-100037-0x00000000002A0000-0x00000000002A1000-memory.dmp

        Filesize

        4KB

      • memory/68392-100038-0x00000000002B0000-0x00000000002BD000-memory.dmp

        Filesize

        52KB

      • memory/68392-100039-0x0000000000440000-0x00000000004A6000-memory.dmp

        Filesize

        408KB

      • memory/68392-100025-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/68392-100044-0x0000000000440000-0x00000000004A6000-memory.dmp

        Filesize

        408KB

      • memory/68392-100043-0x0000000000330000-0x000000000033C000-memory.dmp

        Filesize

        48KB

      • memory/68392-100041-0x0000000077A80000-0x0000000077A81000-memory.dmp

        Filesize

        4KB

      • memory/68392-100056-0x0000000000EE0000-0x0000000000EFE000-memory.dmp

        Filesize

        120KB

      • memory/68392-100024-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/68392-100059-0x0000000000440000-0x00000000004A6000-memory.dmp

        Filesize

        408KB

      • memory/68392-100057-0x0000000000090000-0x0000000000095000-memory.dmp

        Filesize

        20KB

      • memory/68516-100047-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100051-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100053-0x00000000000D0000-0x000000000013A000-memory.dmp

        Filesize

        424KB

      • memory/68516-100052-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100049-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100050-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100048-0x00000000000D0000-0x000000000013A000-memory.dmp

        Filesize

        424KB

      • memory/68516-100046-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100060-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100061-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100062-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100063-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100064-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100065-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100066-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100067-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100068-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100069-0x00000000000D0000-0x000000000013A000-memory.dmp

        Filesize

        424KB

      • memory/68516-100070-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB

      • memory/68516-100072-0x0000000077A70000-0x0000000077BF1000-memory.dmp

        Filesize

        1.5MB