Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:54

General

  • Target

    68ea74d81032cc2063e38713d1f60bc7_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    68ea74d81032cc2063e38713d1f60bc7

  • SHA1

    10c89db2da989a74986c313784ed3911bd619ebf

  • SHA256

    f4665a7274e113691256ab2e8d894098a5861558492ad71ee76544d029a172c1

  • SHA512

    d71471c665b33bec2ac1f3504d7f0f3d167d111d5d71f61f9586a41cb7059a011d680b7eef935aef45a316681553f97de5e1f4c5204827c2c538e52cbfcd02de

  • SSDEEP

    49152:Xh2qFcpFKLHn+om6N28ti3HqU/S4j8B7T9:XhxGFKT+F6N286KA6/9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68ea74d81032cc2063e38713d1f60bc7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68ea74d81032cc2063e38713d1f60bc7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM WebActiveEXE.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1756
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM TimeGridEXE.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Program Files (x86)\webrec\WEB30\WebPlugin\WebActiveEXE.exe
      "C:\Program Files (x86)\webrec\WEB30\WebPlugin\WebActiveEXE.exe" /regserver
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:2708
    • C:\Program Files (x86)\webrec\WEB30\WebPlugin\TimeGridEXE.exe
      "C:\Program Files (x86)\webrec\WEB30\WebPlugin\TimeGridEXE.exe" /regserver
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:2556
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "atl.dll"
      2⤵
        PID:3012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\webrec\WEB30\WebPlugin\timeAxesDll.dll

      Filesize

      96KB

      MD5

      559c9a30db9b9fdfd54ab29c88c5909a

      SHA1

      4b49e6abc9433cd0c81aef99482a01be385764f8

      SHA256

      af5d26108c799b176f4ecae32fa4b09f10b29cd0dae13c99b16600aae13eeb4a

      SHA512

      d2c24d21e836bfd913737d735386d7b6469e0fdd8d90171dada836be3455e0d0f20ea929e397f263075738cd6a5060978b905dacfb25793094d361231b0c1ca4

    • \Program Files (x86)\webrec\WEB30\WebPlugin\TimeGridEXE.exe

      Filesize

      52KB

      MD5

      af50127a954067653a489b703e19eec0

      SHA1

      3664f6855dcb2ad142e2025e3b803fccf25f0113

      SHA256

      e3315101016dac8499cd41342ad82d50acda5f832256a439391908e509082103

      SHA512

      071dd32f257194b35d912d35ea1421282b5962fe9985aef5a6b7380ce5e2d71310fc78f75e9c1c374078871b2e1c6f4a47a5ec2e90de684f7d06cd47bd9e6719

    • \Program Files (x86)\webrec\WEB30\WebPlugin\WebActiveEXE.exe

      Filesize

      144KB

      MD5

      19734330434bd0ff9a79299abaeee6e1

      SHA1

      1dc0cf02842fdbae933bed05f9e12441ba66ab87

      SHA256

      782d58dc5c604d3f63b1c07dd3a436f9d5390849dc42a852c22ab6b623c69758

      SHA512

      ff631ada408a7a89642380262cb3337226acce50386e226e723e01b47d7bffbf16a234fec94d7329a26be50ffd1677924009b8192d236bdeb103f1c6bb23f93b

    • \Users\Admin\AppData\Local\Temp\nsd1373.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      acc2b699edfea5bf5aae45aba3a41e96

      SHA1

      d2accf4d494e43ceb2cff69abe4dd17147d29cc2

      SHA256

      168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

      SHA512

      e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe