Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 00:21

General

  • Target

    0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe

  • Size

    155KB

  • MD5

    0b7c9f69a94b45d3ba41ec21747d5257

  • SHA1

    09f42eb50a34500f6cc3cde6a18dce0883707986

  • SHA256

    d60db77657efe6a3dd701bf72bc16dfb56306bc1b0d508a549aca0d8f36338c1

  • SHA512

    af3eadc5c49b43048ac9195f98001ded443463d337dade79e7ea90ca0623955aa1aed23b0f45e7964b7797cc63bf95aa31025930443ad2d87e8e7e2c891d6aa3

  • SSDEEP

    3072:Nnj9jtfU+INndIc0JHmHkCAZfViVUdR2ckgAWTjlohOg6sZQGfPUMAlXzsl:NjbeinU3Cf34ck/WTjCkgvfgB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lgqq4qwc.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES23A8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC23A7.tmp"
            5⤵
              PID:2664
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fFirstNames.txt

      Filesize

      7KB

      MD5

      890ead2e9641fb4d552b70f5cba861e1

      SHA1

      a136cf74a7e7bc431084758063ef26fedd2d8346

      SHA256

      60fee88b19f44b00cbc6d3e4e41eefb53621aa838c79ce429d13d73fc02fefc6

      SHA512

      ac4fea6d72d83ffea6cf30ff1996bd2f3ee35ae7d48a780932f426e4c5acc7e931123cdc83c509faf15e298994eaac35dc17ac2f1cf7ccccc7ba142608e9aa73

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lastNames.txt

      Filesize

      7KB

      MD5

      0d35116485e8fb0a458d49989e61197b

      SHA1

      970c8a8111815f7d7631d7e3e73609eb2563e128

      SHA256

      f5cc940e3e835faa99285a66f0787546ee33175b01769251467d54db0409de15

      SHA512

      416e761e70db41a640a7ee22995c4ccea8f4a29131b58171ee4aa74d1937e312a5215796a44dc7778fe9371201c29597cebc2c8b556ba60271a57a4868d7d49b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mFirstNames.txt

      Filesize

      6KB

      MD5

      056de44ff02c983d6915228cfcd970fc

      SHA1

      b41793853c18f620a95dc19e91739fb77f975615

      SHA256

      9495302ed6e44d73bf4d59d01598e878e97c621cff83042c27b461726c645971

      SHA512

      7b18a8c2cee6979a8fef5324c0dcf254e89a3883a05dcec3eba10f589b87d1f5086e7427b2d96e4ba60bf97f313a0d8250ae1d27d9e1fe1e8b62fed74937ff9c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipCodes.txt

      Filesize

      43KB

      MD5

      fb2f21dd9cf648dc34f8e8f3f3a71b4f

      SHA1

      74ae0d969bf3eae2812cac75406e194818c6af8e

      SHA256

      67b0fe6149bdafc95ec8eb1f74d96f29d49f4a90f8f2df19ad60da69e8e3b8af

      SHA512

      a61b41967976b319096aa5220b317ff2c2d9bd20e759b793c22453925b68435bb2ee793032b5c32813ac102165ef5cbb39e142d27fb340f1c3b0e9a5d4299a67

    • C:\Users\Admin\AppData\Local\Temp\RES23A8.tmp

      Filesize

      1KB

      MD5

      bfbcc8a5c0fe004adb350d47a45b257d

      SHA1

      fe86febf429f7dc2a5f47dfe54a08a232ab2d783

      SHA256

      906cd4e0e2052f7f012c58f24c8c768fd7738fb57dbde617fffb9c944f0d9ede

      SHA512

      299268a216945615c1f2550a91fa937ee7d882ef808f9c3a74f747bee9b2ec836e7d3b26f3a8a55611d452497b9abaaad9a93dedc9f601957f62ee36f06bfd07

    • C:\Users\Admin\AppData\Local\Temp\lgqq4qwc.dll

      Filesize

      32KB

      MD5

      9a956d6e6df78f272893fd939e38bb65

      SHA1

      c7e7e620f427c66121c7de3235c6e9d6bc0a735c

      SHA256

      45bc7b4a8544897187b97f888282393ef7de84eed010192f5696ab727cf48bfd

      SHA512

      aa6c0b740461eb289e53eb9d93d2157ea26efa8dcd5b2b8bbca1559958746ed09c3efd7542a6f99e1296462317e9d9a126d08e1634fef92ef2b8c47292517408

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC23A7.tmp

      Filesize

      652B

      MD5

      ce6f3a28e20d68f99e9d6f4a5e7390fb

      SHA1

      dcc62ae48c070e55bc69bd2317d24769ea937c5e

      SHA256

      ecc5fa2761a33ee76fd6afd3f69c3df07030ab4d8b2f47a219ec8915fb9f6e81

      SHA512

      8616a56b890f6f9a2cdc27118f54d82786c8d42b7c6c1e311922bf43ce45003e009fa1e7a12f3253c33c0ea99524e8e1fc66e597bca60c45a0ef0ad6bfcb032f

    • \??\c:\Users\Admin\AppData\Local\Temp\lgqq4qwc.0.cs

      Filesize

      39KB

      MD5

      23a76cc9317bc2d7757e89d7197a893e

      SHA1

      0372ee4a8404bdb8ba6cba344448b0754b98c2ce

      SHA256

      db6c8cfa63aa4d909eb60e8ed30235b56508e3bfab2cfa3e93ddd62c94179022

      SHA512

      68fac7a9ecb8acd44107d0b2ecc0077b7f5185ac5a2ccd0e3e319b4dce36b9b9a53b33b1b8ded02427b4cbee5c28ebaa969849122ca13f41a77f72478282bb41

    • \??\c:\Users\Admin\AppData\Local\Temp\lgqq4qwc.cmdline

      Filesize

      598B

      MD5

      667a51680fa7d43bd56e44c439abaeaf

      SHA1

      357c70f518c8ccb5d00ef90e33983fc1f249b4a2

      SHA256

      2900d399384027ea8be13d435e6f8a44e0184a31d9b612bd4ea02abe32e60203

      SHA512

      40a26da34f1b222939019034a76295db03ea2c612486b20964795ba5dbc3837ebeb45d432b36928a86e33d80f1f1c862908c0ab6ef034e015e5865871ca5ec8a

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe

      Filesize

      53KB

      MD5

      e80f959c5fa918eeb106b87ac88f3b1b

      SHA1

      b31cb37cdd9ea70af01437e3ed4398fef421a232

      SHA256

      8e2e1357b6dc472c1beaa9358cbfa21be653b3d171e9b4bf086c15dcca9c3df8

      SHA512

      061236fae2212451ed45cf6019d51145bbb2259167f0d3e5a1560e1224d0020c5e4561c3482ff6df3d6c9c9ce9f793c1d60a97b40da4702bf44414fd45e268d6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe

      Filesize

      20KB

      MD5

      e3761cbb4338919e74a783ccba9df608

      SHA1

      c834f300e52b3623fc21196baa9c066594f0eb5a

      SHA256

      8151fc1655de34870408efc61ae0794f0fc0263f82649d2de78c527da249d87f

      SHA512

      850bdb16b42dad3259c6213ceb0fa888c023209429c254deb138a563b50d2adbe3b0b7ead9a9d48cc89c93a9ee1c9a46dab9255bde4796293611d214763b1001

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe

      Filesize

      149KB

      MD5

      eaa7bc60632fe839d29d9264b76ec2e9

      SHA1

      9817f6f99631d76836ce56b253dacc1ecfb2d049

      SHA256

      63a28d42281c22c3ef912805a4d2f398752e065729fcc4e57a283378d7b832dc

      SHA512

      4eb39c2ab73cb86ac21e5c782f1ce874f245d127caf42abcb5e0a312e8794c168fe1ef24bd1af7ff3a39a88f6052c8a1f9bbd76b247d228eda4b8636e4d506ed

    • memory/1384-47-0x0000000000A40000-0x0000000000A4C000-memory.dmp

      Filesize

      48KB

    • memory/2168-25-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2708-49-0x00000000218D0000-0x0000000022076000-memory.dmp

      Filesize

      7.6MB