Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 09:13

General

  • Target

    8d929122aba28ca23cb53c0a2f3d5859_JaffaCakes118.exe

  • Size

    12.5MB

  • MD5

    8d929122aba28ca23cb53c0a2f3d5859

  • SHA1

    f0ebd876d386eac18ef055703d7eda4d1209ff2e

  • SHA256

    a1b49c96c5804173b0b616cb908aab32ca70e1eece7f803364533e628bd6a3e9

  • SHA512

    4d8b5dd939f97983e5a00c54829e5f80a082c7dcf0d75c052606dd750da93905657fda1da9b7173c14d66de3e6beb9dc3c48145eda9aaa90b41066c579f66ffa

  • SSDEEP

    393216:5xN+83+JUzBKcIbEqzqDtH9MtV2ChURiGQj7duT:h+80aBuNmrMtV2I0QjBW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 61 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d929122aba28ca23cb53c0a2f3d5859_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d929122aba28ca23cb53c0a2f3d5859_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec /i "C:\Windows\SysWOW64\Adobe\Shockwave 12\swMSM.msi" /qn
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      PID:2732
    • C:\Windows\SysWOW64\Adobe\Shockwave 12\SwHelper_1235205.exe
      "C:\Windows\system32\Adobe\Shockwave 12\SwHelper_1235205.exe" /regserver
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:1848
    • C:\Windows\SysWOW64\Adobe\Director\SwDnld.exe
      C:\Windows\system32\Adobe\Director\SwDnld.exe /regserver
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:1032
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Adobe\Shockwave 12\swMSM.msi

    Filesize

    2.0MB

    MD5

    25b47efbe9dcef40bb9760b6b7846b99

    SHA1

    0c9bf0fe2fb303f661cb9e422442200974f5ac28

    SHA256

    0bb631d810fdd00cafe5da937174a5df79ca4a4daa46a0e714c39a1ed06fec3a

    SHA512

    0707aa06ecfc5a4b8ac564e3556ccfc458a6a81cf652084be7917331b25c14e2607479212d67d65dd0bfac264cc8fcdda58c3c379ab86ec1bd2f5d309b2770ec

  • \Users\Admin\AppData\Local\Temp\nstF8D.tmp\System.dll

    Filesize

    11KB

    MD5

    3f176d1ee13b0d7d6bd92e1c7a0b9bae

    SHA1

    fe582246792774c2c9dd15639ffa0aca90d6fd0b

    SHA256

    fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e

    SHA512

    0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6

  • \Windows\SysWOW64\Adobe\Director\SWDNLD.EXE

    Filesize

    150KB

    MD5

    1f29929c7d653b691d9003f9c531271e

    SHA1

    36fa927b980fefd51e9f4beb0700b0831b27483c

    SHA256

    ae9c8dee11b894a041fb8de707567e1bcab2eecb50b2aae912e7c5d43d919185

    SHA512

    eda4ae26ca7ee0bedfe41664dd333d542b51000675e71b7ff626f03f24a385e45f4dc98fed69ce0121a8ab046eab7a7caf2ed178bd551487d525119de76da044

  • \Windows\SysWOW64\Adobe\Director\SwDir_1235205.dll

    Filesize

    394KB

    MD5

    362adac40e323315dd5917dbbefcda71

    SHA1

    98d3511d7ce634683a0a973f11558df4cce7da05

    SHA256

    2f2a53d680162de293f53592451f9559876e19de25053180d430e6ec07b32fe9

    SHA512

    52e7628112ef53ebe58a5650d8923935febbec09416528786fcfbb44d431bc5252a1cfce8d843da641417ff924a8a2cfe07e172fc6f64657b7c0dda7c55d9a97

  • \Windows\SysWOW64\Adobe\Shockwave 12\SwHelper_1235205.exe

    Filesize

    1.3MB

    MD5

    a8508a1759cd36e437042bdc9e377575

    SHA1

    1667f5207ff2f266514981a7158378fa756fd7f6

    SHA256

    ac394a271655fd3df3c70a3adafc088d2e2600a426e1cc6c0787cde8025b745e

    SHA512

    e9724e336c6f70060ce9e27403adcadfeb49f0a25f158c59fb35532758b5e5ccfdc7895e3881f049301631b10b824255d5ca29492e2eed1655fbd6e210846a1e