Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 16:47

General

  • Target

    07e625e7822aea2617c43791442dec86_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    07e625e7822aea2617c43791442dec86

  • SHA1

    e8bef818f8d7ecf0bd384c12a9004caae17fb19c

  • SHA256

    10fb746298864930cb185c15343a2bf68ad050a7e159c169ca07e482bb66ab0b

  • SHA512

    af2798ae0e409c1a89a76b348536374187c904209a9c0905bcbd99cdf2f82ad19eda4b98b7b674aa309ef268cf734213babd4f94563d40c69f07978ee20d842e

  • SSDEEP

    3072:8dpckuDkxPa3wQWuD3gse48yrtZJsok/fH:YpitZJg28+I/f

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07e625e7822aea2617c43791442dec86_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07e625e7822aea2617c43791442dec86_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\5GC4RN6QU.EXE
      C:\5GC4RN6QU.EXE FDONSZUYCQS
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2200
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "c:\windows\fdonszuycqs.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2588
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\LNU949NEI94B.BAT
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s itss.dll
        3⤵
          PID:2920
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2652
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s scrrun.dll
          3⤵
            PID:2600
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /s jscript.dll
            3⤵
            • Modifies registry class
            PID:2604
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s msvidctl.dll
            3⤵
              PID:2756
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2748
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2772
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2628
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2084
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32.exe /u /s vbscript.dll
              3⤵
                PID:2760
              • C:\Windows\SysWOW64\reg.exe
                reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
                3⤵
                • Adds Run key to start application
                • Modifies registry key
                PID:2612
              • C:\Windows\SysWOW64\reg.exe
                reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
                3⤵
                • Modifies Internet Explorer settings
                PID:1208
              • C:\Windows\SysWOW64\reg.exe
                reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
                3⤵
                • Modifies Internet Explorer settings
                PID:2740

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\5GC4RN6QU.EXE

                  Filesize

                  10KB

                  MD5

                  19595de7fbed86bc29d5d9547073ca63

                  SHA1

                  8fa2edaa9e3edefeb672bb3139436fddc5bb3d27

                  SHA256

                  e3c841c3b05305890c2496dadf759a8077860f4b1e6a73a12e90bd97cfd95b44

                  SHA512

                  740d859c835fd168b6f9951475fd5054515fd83150e655ab6f3d24b320ef235a6af711a08adc615b1186c06c0c2ef5480152c6b53cfcafbd8fa79a5133916747

                • C:\LNU949NEI94B.BAT

                  Filesize

                  1KB

                  MD5

                  91d17ba69c29686ec8929044ff7fcf56

                  SHA1

                  db0f273606c7eb9825f57caf9338abf0981d477f

                  SHA256

                  2f62c3275b2af56b9801147a9c876bbb9b4cd9ed284f4355d9b66dd557c41eb7

                  SHA512

                  171213b4095a7fb299a2ba35da4ed7ac201844b05d5329b08a0f5fc297a1971751f04579a9e7925d5d2c3438696eb8fecf4f27869cda16fca030c1a50cb301dc

                • C:\Program Files\WHXKH2G\UGHZ8HISW8S.EXE

                  Filesize

                  148KB

                  MD5

                  07e625e7822aea2617c43791442dec86

                  SHA1

                  e8bef818f8d7ecf0bd384c12a9004caae17fb19c

                  SHA256

                  10fb746298864930cb185c15343a2bf68ad050a7e159c169ca07e482bb66ab0b

                  SHA512

                  af2798ae0e409c1a89a76b348536374187c904209a9c0905bcbd99cdf2f82ad19eda4b98b7b674aa309ef268cf734213babd4f94563d40c69f07978ee20d842e

                • C:\Windows\FDONSZUYCQS.txt

                  Filesize

                  148KB

                  MD5

                  c0cf92e9183b14bc1828b44e82cb9f81

                  SHA1

                  9a4b43dd795fd04cbc8c44c3eae5bd29959c6348

                  SHA256

                  574aa82a40def0ffd1e2b2786f670249e5f94e3faaf0c369f9790d16c88caf9a

                  SHA512

                  d59d534e1215efeac94b94cd7fc8fe85784dc1d39a10666817323cfc6398d1ca3c5f1e59d6a4d0eb1c9e6428d1279e8c11d06f98a2e0c467fa2a1b6c7ad46a3a

                • \??\c:\windows\fdonszuycqs.dll

                  Filesize

                  28KB

                  MD5

                  ecfee270c2d71fbfe96568bd1e214665

                  SHA1

                  c6ebebe2e6313fee775454451fe8cf460733939b

                  SHA256

                  fcfba5ab83249f8335eed513d3541833fa612d6e483bc77417c55ac6732b78b8

                  SHA512

                  2ef6e08a7fd7915e857877ce5bcc0812fbb18bd69c840fce57d01363b70ea503ecfffde3b03af576655011220dd4f4e730d56be5f9985c240d08303b23564078