Analysis

  • max time kernel
    138s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 20:11

General

  • Target

    76af348518fffd3b633694751d5e6e90_JaffaCakes118.exe

  • Size

    362KB

  • MD5

    76af348518fffd3b633694751d5e6e90

  • SHA1

    880e2d4f647bee68d8edd2a2b649be480e5a1c9a

  • SHA256

    f8e2445d5187846a19b9138cf18a51cc2b8d590d95af57ee57bbaa68cbe8fe39

  • SHA512

    c837e7e7c45e10ddb0ca5fe6bd177b9fbea8b31ece840b3ba638fe20b5a07d57db3bce73ebdbcfa8b7b42938984c5d3e916a481f120780ba7fab3d3b2ce47bd0

  • SSDEEP

    6144:FraWkc+CrdYzNJdL38Lv1E0/Vxu1g+a/ko/+ymQVtWphD+iLiZqY+BUoEBEjMcWw:VaWh+uSzNJ21Fu1gFZIQVspzBpBUo/j9

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 47 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76af348518fffd3b633694751d5e6e90_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76af348518fffd3b633694751d5e6e90_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\Run.exe
      .\Run.exe
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2644
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2612
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1740
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1952
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1552
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2084
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:560
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\Invoice.htm

          Filesize

          6KB

          MD5

          905bcafd0c52d766fe5f07d83b5a4416

          SHA1

          cb8eb19195aec0fed9cbc7f1965953bb363bba23

          SHA256

          db30315388ecb39492d09a0e2447a2dbccc902532f284f9a25f3c95e092af1b1

          SHA512

          6f861d5e045ad192853468ccea0dfcf2292483a269776e22b38b333089a09a6ecf85843cc5aeff543c5d3acf318be32a05c1de533200a4e3b0f6690d079d2027

        • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\helpdesk.txt

          Filesize

          569B

          MD5

          d3eff0be4491f6328b3ce63638e7f8b9

          SHA1

          ba1e42d54e47d3961f5dbc52a7a616a7d03e36af

          SHA256

          39fa64b6ba5dc2054bc669dbd19057927fc7cd039d076ecc2487624484639ed7

          SHA512

          f9e484faa4dd451ace067f5b36f1ae9376fae1e6220b744ea96c8799b56aa620a4ef054ba27adca3b3490ea855f2390fc771502d0ba468c129e74abe3a5de118

        • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\logo.bmp

          Filesize

          23KB

          MD5

          f2c4fc28372ca1c4fa4b527ef2b396d8

          SHA1

          6adde5d8869c505f04bc1b1a6650e3a8f9f18065

          SHA256

          c94576cdcc4015ad0436add6970ba0313187c2c5a0ddb6ef18a73af68ae7e3c4

          SHA512

          6ce1c3e11281764c77710e0533909d0860430194114f82bdc68ca474fa780f437579d21cc8863aedda6a24ea69622c6badc2d58ee244979ea4fa5706f070904e

        • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\logo.gif

          Filesize

          807B

          MD5

          983d88150a2f22337facfdde79c34a34

          SHA1

          2fbf5d1c0b9f7a0ffead8a440d2b07c9efb8270a

          SHA256

          d177fcf781f78f722b0f5f59056affa6f9db376e9fe22167fc41efeedacb70e9

          SHA512

          7db2448c0bb0b931eca4de7de29f0894432597b2bdfc65409c345c8e9a158fa9951ff84ab574ec3712602d218591f50c0942da6f5dbf682081f9b3d8066e8781

        • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe

          Filesize

          241KB

          MD5

          0f6c7e390b1b3ba06792585e96a0e81c

          SHA1

          874cb4bba2cbfa263eba79d695bc2fc421562e3a

          SHA256

          70cae2dc05434905dcec4995a16e504a8552bcdf836f3b0f47c201e7c6f2db2e

          SHA512

          6767a1b7798ef13c8f41c6a4805dc950f53b0a73c321b3a3b59c38693232f660eafdc21b08c0ae472b17ee9639cc55d863592586f0a4deb51106b111ec3c1ad5

        • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\settings.dat

          Filesize

          2KB

          MD5

          9053991894eb4495eae052771e20b2b0

          SHA1

          291fb1256d9df4767f1d209b1ef2f528b4ef98c4

          SHA256

          3eaad270eae612eb953494af2e20e8531f22878a44cdbea4ee579ab1dc956863

          SHA512

          653275e4dd860df1494f25a0c5fb37a2cb0637161172b838168fb5c249a5a3aa5ae925577a44d1650ea956022524b593fb17dd962c03280dac6cfd21ab3e207e

        • \Users\Admin\AppData\Local\Temp\7zS2202.tmp\Run.exe

          Filesize

          460KB

          MD5

          9149fc4df0437b1b452f6e80d528195f

          SHA1

          ead677fbd3f0ce27ad2b44ee945bda060ef6419f

          SHA256

          4e2fbd480e19e7411684eb0fb82bf9f766602a5e9ba696c50c4d1471d9a1187e

          SHA512

          24c7888510f2a1fe6905ca1bc71b81132dade8981d595c4e4e26a81f4a0858d776fd0d8b008e60e4e6343192bde53e59e5e832f351fa540fb87abaae83cb1704