Analysis

  • max time kernel
    142s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 16:03

General

  • Target

    2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    2100dd61aa4983e8d3fdee18ade84c21

  • SHA1

    061f3aac07cdc9177e0fb3642bc1d2c923500e90

  • SHA256

    480b5066ad2a0c76aa3cd99d7626845ad79dfb80488491bfbeb0b29ed0e95a7d

  • SHA512

    3c543ebc060cc2486fa09176682a5fc92776b1e1d091905a3b79d1fceff3b02c005472dcff30c8df7b2d9eb795ab82c329ccc4e20761cfd588469c3f4e5f60be

  • SSDEEP

    24576:+QXvmjWP/UVldr7wh3dsT8FRZuzslwXpdy2NZQ6yHp4PZwfQ95a3g6:NFHmr0NsEuYA82HEHiPZwW5aw6

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Executes dropped EXE 33 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe
      "C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe" "u 'http://www.freeridegames.com/spdo/feeds/sdmConfig?camp=%s&serviceId=143&gameId=%d' p '143' c '610150' m 'playfincom' t '0' l 'Default'"
      2⤵
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHR
        3⤵
        • Executes dropped EXE
        PID:1320
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPR
        3⤵
        • Executes dropped EXE
        PID:4788
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        ER
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4484
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          R
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:1396
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHW
        3⤵
        • Executes dropped EXE
        PID:872
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPW
        3⤵
        • Executes dropped EXE
        PID:1144
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        EW
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          W
          4⤵
          • Executes dropped EXE
          PID:3068
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHW
        3⤵
        • Executes dropped EXE
        PID:4584
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPW
        3⤵
        • Executes dropped EXE
        PID:3912
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        EW
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          W
          4⤵
          • Executes dropped EXE
          PID:912
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHW
        3⤵
        • Executes dropped EXE
        PID:2716
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPW
        3⤵
        • Executes dropped EXE
        PID:4520
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        EW
        3⤵
        • Executes dropped EXE
        PID:4936
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          W
          4⤵
          • Executes dropped EXE
          PID:3996
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HR
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      R
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4124
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PR
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      R
      2⤵
      • Executes dropped EXE
      PID:2408
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:3212
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:4604
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:4628
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:3736
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:4464
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW
    1⤵
    • Executes dropped EXE
    PID:1468
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:4300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Temp\ietemp1.dat

    Filesize

    119B

    MD5

    1f491dca9b1d377104635255a8387b78

    SHA1

    ab3fed6381fcb21a90753c35f72739f736965084

    SHA256

    336fb11c29cd7a96cfde4061e65c64d23b2bdcd1720c739b49589ffff7f5f64e

    SHA512

    db9d19848767127132be91ffa5fb8825596646723b6945de4ff1b2f32b60ab539da0fff02a0c9b1d0d8fae721c773a42a8a9438c77626b696ff86c0ae4f8a113

  • C:\Users\Admin\AppData\LocalLow\Temp\ietemp1.dat

    Filesize

    236B

    MD5

    dcc8221b730cb7f2669ddb53e584251c

    SHA1

    98fa735a2ace0670586a554241a6a5d24f4c1a9e

    SHA256

    b0b7993d1a562d7ef7b178b3e39d0baa8984bc73ad5361af27b7b571f8838d57

    SHA512

    7b9e0470fcd8d30e05f11195d06ce7955d1b3120dd1c7345b6403ffd958f74a9d46b264329a0289462531df3f745b8f98578c88abf6ce060e9cc1c66d4316d10

  • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

    Filesize

    104B

    MD5

    0ef30583cda51acd60ba2686bc0eb474

    SHA1

    951b6fd2178e6fe232fbb4fc15ec7bf60df273a9

    SHA256

    eb372cf4a79a088b6f3bcae49028ef87167c52317f0129e0f6db986c963193d7

    SHA512

    8eabf964c4cb6b01f0596151c28e7a23b896d6df3d280f33b75306bf8ae7dbb8ebf90e4c9bbebabe4358ea1b443eda970213e93ee45fada1a22f9309e42be59b

  • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

    Filesize

    23B

    MD5

    4174cb800274e3c271f7e53ae1b9ae35

    SHA1

    6ac0ca77eef3b68c8db3349f1ceb0c8083450642

    SHA256

    d5e0a12b015868fdafdbdcef807fee6bf17e326db04c64079833e829bf34112e

    SHA512

    c73823299a4706ad1feec4497c1e01c598beebe5679a1bbae2cfa6305b282f719c5c14c1fbc3d982db111cda6cdcc7721f22880391155ae9112f6b5f1cdb7cdd

  • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

    Filesize

    206B

    MD5

    aaf191f0cf8c1c01694b4fc6cd7b605d

    SHA1

    1887ac850358015a9191e6a51f125d1f0cb621d8

    SHA256

    7d2f21ba517a59f132c0f39871b2c1188b915aa97f41f214414f23d4cdec48c7

    SHA512

    dfc5ceb9935967fe046014d8043f44e14b7debd56a6c8e3e803e72cd6833b247d8e01293a0b14aba904898ebd8e1f06b50cbdc063b7beddda56b92069670d2cf

  • C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe

    Filesize

    503KB

    MD5

    dc7b5f12c7ff9af697203cb0c59a3516

    SHA1

    1769c4f64f8ab818a797e3fa1e5331a50ffdd678

    SHA256

    b07ca37c2938966d2290c8b76f039febe8da9a919ad235b8eedaa583ce991b92

    SHA512

    904ae1dc91e5315f05be5cd7239f3fc4d3702b8c78dfd93d76b64d1cc1d7051aa005de2c69e5a8654eae8131dbd3d80c66f6e33d7c8b097972285405a5799350

  • C:\Users\Admin\AppData\Local\Temp\SDM143\Splasher.dll

    Filesize

    469KB

    MD5

    a6a8f89250cdc734a163868a0f5cccea

    SHA1

    6ab06aaf1e795bc1a72c8095708568cf2d3bed38

    SHA256

    7868cec689ba10bb6d8a5a1abc0508183b817e5814fc504e090e104dd7d37483

    SHA512

    7991d28467ee0a896e304d18c7fc4caac9e9ac2f57198313d5688ddc68e22ae80447c92a097b5e4ed6ff86a90df607ff1ffa61c07082f85b5f222b07aa4a7ca2

  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe

    Filesize

    234KB

    MD5

    2c3c18baaee7775b6d588cdf1529e528

    SHA1

    88fa58fbabde59e80c96e7676730ca40d1649b9a

    SHA256

    9c980d85903561c44f84faaee80d911bf3c9ef9d238fe69b7ccc6998d0fe9232

    SHA512

    4b69953b02d5c810003eb938da85b51b4906c48e48f441175a3ab76b6e8e5dc293ee683a9c90503b3db4ae72cd6557b8609dc1f4fefc82322f946a7072208348

  • C:\Users\Admin\AppData\Local\Temp\SDM143\resourceDll.dll

    Filesize

    171KB

    MD5

    0c395ce6f6961054219b6d34927f8903

    SHA1

    55fd653c8f6d1253e221d49f1dd097ea73262d55

    SHA256

    e31a495075247fba426b5a4928560a578eaab44f828a2fdca496a05589509352

    SHA512

    e6b2f487eea8c5687a41ad58d955cb67b48881a728eb84f730a1d8ec50057bf80f77a21e22ad977673bff9d783deac02ebeab7252ccc7f98b3ecc34486b2b67b

  • C:\Users\Admin\AppData\Local\Temp\nsr3F3C.tmp\System.dll

    Filesize

    11KB

    MD5

    a436db0c473a087eb61ff5c53c34ba27

    SHA1

    65ea67e424e75f5065132b539c8b2eda88aa0506

    SHA256

    75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

    SHA512

    908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

  • memory/912-111-0x0000000000D50000-0x0000000000D8A000-memory.dmp

    Filesize

    232KB

  • memory/1396-72-0x0000000000150000-0x000000000018A000-memory.dmp

    Filesize

    232KB

  • memory/3068-90-0x0000000000F30000-0x0000000000F6A000-memory.dmp

    Filesize

    232KB

  • memory/3212-79-0x00000000002C0000-0x00000000002FA000-memory.dmp

    Filesize

    232KB

  • memory/3708-50-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

  • memory/3708-47-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

  • memory/3708-44-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/3708-52-0x0000000010000000-0x000000001009F000-memory.dmp

    Filesize

    636KB

  • memory/3708-170-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/3996-129-0x0000000000280000-0x00000000002BA000-memory.dmp

    Filesize

    232KB

  • memory/4124-61-0x0000000000A10000-0x0000000000A4A000-memory.dmp

    Filesize

    232KB

  • memory/4464-118-0x0000000000460000-0x000000000049A000-memory.dmp

    Filesize

    232KB