Analysis Overview
SHA256
dd307eb37c36895539f973f7e2fdbc44efcc8b368914ec443805d705d460059a
Threat Level: Shows suspicious behavior
The file a9931d09c357cb42f0136b83f8c35585_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
ACProtect 1.3x - 1.4x DLL software
UPX packed file
Writes to the Master Boot Record (MBR)
Unsigned PE
Program crash
Enumerates physical storage devices
Modifies Internet Explorer settings
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-14 12:02
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-14 12:02
Reported
2024-06-14 12:04
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
53s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4364 wrote to memory of 3800 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4364 wrote to memory of 3800 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4364 wrote to memory of 3800 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\jedata.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\jedata.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3800 -ip 3800
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 644
Network
Files
memory/3800-0-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3800-1-0x0000000010009000-0x000000001000A000-memory.dmp
memory/3800-2-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3800-3-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3800-4-0x0000000010000000-0x000000001003E000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-14 12:02
Reported
2024-06-14 12:04
Platform
win7-20240508-en
Max time kernel
140s
Max time network
122s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe
"C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | dn-psdico.qbox.me | udp |
| US | 8.8.8.8:53 | hi.baidu.com | udp |
| US | 8.8.8.8:53 | dn-psdico.qbox.me | udp |
| US | 8.8.8.8:53 | webpresence.qq.com | udp |
Files
\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\jedata.dll
| MD5 | 114054313070472cd1a6d7d28f7c5002 |
| SHA1 | 9a044986e6101df1a126035da7326a50c3fe9a23 |
| SHA256 | e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1 |
| SHA512 | a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522 |
memory/2104-25-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2104-28-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-29-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-31-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-32-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-33-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-34-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-36-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-37-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-38-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-39-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-40-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-41-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-42-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-44-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-45-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-46-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-48-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-47-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-43-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-35-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-30-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-49-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2104-50-0x0000000000400000-0x0000000000A75000-memory.dmp
memory/2104-51-0x0000000000400000-0x0000000000A75000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-14 12:02
Reported
2024-06-14 12:04
Platform
win10v2004-20240611-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\IESettingSync | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe
"C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\PSD缩略图补丁 4.5.exe"
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x394 0x4e0
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | dn-psdico.qbox.me | udp |
| US | 8.8.8.8:53 | hi.baidu.com | udp |
| CN | 124.239.243.41:80 | dn-psdico.qbox.me | tcp |
| CN | 124.239.243.41:80 | dn-psdico.qbox.me | tcp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 104.193.88.125:80 | hi.baidu.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | infoflow.baidu.com | udp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 125.88.193.104.in-addr.arpa | udp |
| US | 104.193.88.126:443 | infoflow.baidu.com | tcp |
| US | 8.8.8.8:53 | 126.88.193.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 226.21.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | webpresence.qq.com | udp |
| HK | 203.205.239.181:80 | webpresence.qq.com | tcp |
| HK | 203.205.239.181:443 | webpresence.qq.com | tcp |
| US | 8.8.8.8:53 | ocsp.digicert.cn | udp |
| US | 8.8.8.8:53 | 181.239.205.203.in-addr.arpa | udp |
| GB | 79.133.176.222:80 | ocsp.digicert.cn | tcp |
| US | 8.8.8.8:53 | 222.176.133.79.in-addr.arpa | udp |
| CN | 123.235.31.41:80 | dn-psdico.qbox.me | tcp |
| CN | 123.235.31.41:80 | dn-psdico.qbox.me | tcp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.139.73.23.in-addr.arpa | udp |
| CN | 113.219.142.41:80 | dn-psdico.qbox.me | tcp |
| CN | 113.219.142.41:80 | dn-psdico.qbox.me | tcp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| CN | 120.41.32.41:80 | dn-psdico.qbox.me | tcp |
| CN | 120.41.32.41:80 | dn-psdico.qbox.me | tcp |
| CN | 118.180.40.41:80 | dn-psdico.qbox.me | tcp |
| CN | 118.180.40.41:80 | dn-psdico.qbox.me | tcp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.173.189.20.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\jedata.dll
| MD5 | 114054313070472cd1a6d7d28f7c5002 |
| SHA1 | 9a044986e6101df1a126035da7326a50c3fe9a23 |
| SHA256 | e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1 |
| SHA512 | a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522 |
memory/456-22-0x0000000010000000-0x000000001003E000-memory.dmp
memory/456-25-0x0000000010009000-0x000000001000A000-memory.dmp
memory/456-26-0x0000000010000000-0x000000001003E000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-14 12:02
Reported
2024-06-14 12:04
Platform
win7-20240508-en
Max time kernel
140s
Max time network
118s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\jedata.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\PSDsltbd_64xp7810\jedata.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 248
Network
Files
memory/2128-1-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2128-2-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2128-0-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2128-3-0x0000000010009000-0x000000001000A000-memory.dmp
memory/2128-4-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2128-5-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2128-6-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2128-7-0x0000000010000000-0x000000001003E000-memory.dmp