Analysis

  • max time kernel
    136s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 11:08

General

  • Target

    0827b32f15e2d850cfa269b017207aaf_JaffaCakes118.exe

  • Size

    301KB

  • MD5

    0827b32f15e2d850cfa269b017207aaf

  • SHA1

    aa51719a47a48ee8c239ab03a78a41a00d212317

  • SHA256

    400c5c264a18dc4cf49342f66cf8d473394ef0ca11c08ad9f064be7211986069

  • SHA512

    0d8782fc9dec596594fe77db59725e0cd30cf568ee449ac1d4bd5ccd76ac16914576b357e6de6e13a1c0e11ade6724f77b3e94fb23d2fbce64e5f1e1a0c06553

  • SSDEEP

    6144:k5QDj7VtqyNhni4LJoZUHektYJQGX8vCQZVFKY4fgATvEo/+LPOCljo9VcIWQiLH:k52H1JVouHeIYr8vbVFKVgGEo2LPOC64

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 64 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0827b32f15e2d850cfa269b017207aaf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0827b32f15e2d850cfa269b017207aaf_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\3535.EXE
      "C:\3535.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\web.exe
          C:\Windows\system32\web.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Installs/modifies Browser Helper Object
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2968
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    PID:2620

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\3535.EXE

          Filesize

          240KB

          MD5

          be4137258c9e49395bdee5ff0e00c5c9

          SHA1

          47fd20f3aa36cdf00ca300da8328129db35858b8

          SHA256

          dcbe4b956b2d9edce45b5d341126f0ec966ac87a138929f7f8e6d405f310e6c5

          SHA512

          913fe72a35e31343ae14299aa5d872447700ae3b199a8d81a3532c004d9fd13e0e56918c5ded661cc8780af29329f4c0023cdc222d6be07d6a0b9ef0be442d87

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

          Filesize

          996B

          MD5

          362d46b7ca030bd208edcee784b9ae5d

          SHA1

          8215bc8665cfa57620148535c5a4b6122ab330a2

          SHA256

          d38eea56cb6c8df80bf5d9a3dd979ef0992127020f5b1e2026fa34b10804c2f2

          SHA512

          487c8b6320c40dca423c3fe66658c250a99392aec4977995750ce6c26e499eab0ae7e232cc5ee99281c029f037b774d09d8445cfa841ac81c1b7dbddcc1f0071

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

          Filesize

          3KB

          MD5

          7b5ea9724ec5d150ab0e4d043930f5ec

          SHA1

          e05a12749c57093a6837b54ead4ca24fc5571660

          SHA256

          b463302378dda08436574d0c5c4b32e4cdcdf5d53d8f89e1a467783b973cf203

          SHA512

          417d0bc7f931a5e229b18febb20e21e4ccbc6cbdec7998cae9f5896e49062d11ffd2f71ab516184053eb676431cd2f10a8f4cae436e8ed4365ff03164fca44ed

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

          Filesize

          7KB

          MD5

          c2945ee5c57f33f8bbb6a4f6d539180b

          SHA1

          64c958603de6a1db225752e9abb87222faf24c68

          SHA256

          b6c83639513169d01356a02db1631e8f28320c8ed0cd9f485d5433d13616f349

          SHA512

          8bdd657d45ed8720c92dad611f5c41c0e8e6602444232ce23b0258a8a8c1b194b1ad6498f25292c29ed7b8deb42b220245130a87f54b34d49dd250fb31f149d4

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\web.exe

          Filesize

          388KB

          MD5

          50d0909cea1d547acc11247bdfd0b639

          SHA1

          5e0fd96989296c7142022a5b51ffb00bfc78e4a4

          SHA256

          5b1e764a3061bf865cfc0a35e0956c725b9436d0013b6c2836e74facfa0dda2c

          SHA512

          176187b6cbf129ccb0e2124e1ae6cb392ddda3d4e2dc98233e85cc1216690ee6a6f265b942baac2d3e3bcf7d1acd83a1252dd25db02e126ae708a27084943756

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webhk.dll

          Filesize

          8KB

          MD5

          aef5c7b973d40813f3f760e4b5d91046

          SHA1

          6d6db2387907656f50a61cf219194e7c8fd48e53

          SHA256

          de2ada7b1cddcd14d52b3e3c4159683ce24f86eabaac86181859dff91e5eb55f

          SHA512

          54fc2529948a3f4d21884a730ee47ad7edcaa9945ae2f074f0f4a2b9d5cd08b395a954cb51fc6850a6f01d07030d591b949f48d9b7ba59ff6a4f6cc499178419

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webwb.dll

          Filesize

          40KB

          MD5

          eb1997ae9c885d0f1c25286d0c36fde9

          SHA1

          b6b098141c1d6ada96a2da85718f9dd892f0c07e

          SHA256

          aa88cdb17698e4253dea4f8df598b9a85f15235444fd4803cf1a905e74c6e731

          SHA512

          0aac91a14b7087386b520155b93cf018736c846d9ea6cf2269927bdd778e513ab71c5bfbf07841defe8200c8d08cfcb0a87720de53d9e618d39d9627ea8b937f

        • C:\Windows\SysWOW64\pk.bin

          Filesize

          3KB

          MD5

          d690c4dc9b86542e65429998f80dc69f

          SHA1

          206640573e38680754924097f95bccdca552d296

          SHA256

          42f1208f5fe558a14f57594ed449f88b67436beac0b6e0b7c73dbe5cc5e5d751

          SHA512

          2e2f4c76d4b7f4456ca34ae6d531f724376251cec6652ee741cda832fe428ba07c2ce52dd4e6e590c7c430f57650119b3653105adbb1f56aacfbfb7155bfb321

        • C:\Windows\SysWOW64\webhk.dll

          Filesize

          8KB

          MD5

          a9bce1d47adb3f7779809adc1c04726d

          SHA1

          265b2cd93ba894477c6a9d45b0c9ab65ea88d3b4

          SHA256

          8f70fee209f1ff4fde13b865618751e3c8cdfb454bb1b964f07c9af90e69be94

          SHA512

          ea6b0d8f2c0768c6e1e147c132c24a085c4174fb7ec565d23c774bffebae28c53a2ab60d3d279879a42f904cabb4e5268e767a44773eac648721335817fdacdb

        • C:\Windows\SysWOW64\webwb.dll

          Filesize

          40KB

          MD5

          f5cd91b683eed55da373d54fac54d52d

          SHA1

          83665074e3ee67dae8d0d8010a1bb07d3a6c7ef0

          SHA256

          815f893e764eb040fa19e35b66cbc04c469144575039817de0f8548f39f8327d

          SHA512

          57f74a66057472c1ebb28f666e1478797a8fb1a3b37596ba9d99930e6b6bfb98e2bb30329c31d691f75043d286db2b6d77145b6e9f42801f0719aab77712c0d9

        • \Windows\SysWOW64\web.exe

          Filesize

          388KB

          MD5

          65b87ab2238f38344f5b0604c32d7f32

          SHA1

          7b04e46572ac9c90c8e49d053c327edc015b1e18

          SHA256

          2c89b18e3285f064a709b9e0a31148c4701c8c96c83636266f3b351731021a22

          SHA512

          2d8012a495e85621f31bbdaad3ead45b5358b271fd311c7050bb840536b33b77e9f63cece3ccbf3dd229feb669ac66437eed59c05d6ac8f68fb5fd2e33df95ab

        • memory/1680-47-0x0000000002140000-0x0000000002142000-memory.dmp

          Filesize

          8KB

        • memory/1948-0-0x0000000010000000-0x000000001005F000-memory.dmp

          Filesize

          380KB

        • memory/1948-15-0x0000000010000000-0x000000001005F000-memory.dmp

          Filesize

          380KB

        • memory/1948-7-0x0000000002110000-0x0000000002126000-memory.dmp

          Filesize

          88KB

        • memory/1948-8-0x0000000002110000-0x0000000002126000-memory.dmp

          Filesize

          88KB

        • memory/2360-13-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2360-116-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2620-48-0x0000000000160000-0x0000000000162000-memory.dmp

          Filesize

          8KB