Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 13:30

General

  • Target

    0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe

  • Size

    2.7MB

  • MD5

    0e4119242ecd2b48204c697a11595f98

  • SHA1

    bf0848ff2a8fd223639916b33cb71136377a8986

  • SHA256

    8ba48377fe96fe2c99717b5b5f1c8df66226b96d87a46f4dbb361e9c1c61e612

  • SHA512

    62cea921c0545bbb3ef4a95ee9792c7ab27f01c547c3dee93cb5db9fc832113c26080b560133d73b87c0ffdde96bd7cf520a95456f7ad9fe79acfd62c70b9133

  • SSDEEP

    49152:FnX2elzv9gARZQFM5wo3kxP0p8qf9bbJ/KToQqB3v:TxHAMTkep8qFbEToQqB3v

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1996
    • C:\XcoderX.exe
      C:\XcoderX.exe explorer.exe gb
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2020
    • C:\XcoderX.exe
      C:\XcoderX.exe explorer.exe scp
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2504
    • C:\XcoderX.exe
      C:\XcoderX.exe explorer.exe gb
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2464
    • C:\XcoderX.exe
      C:\XcoderX.exe explorer.exe scp
      2⤵
      • Executes dropped EXE
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    fa05fe9f5d30e2a8fcf08c9185e7eeaf

    SHA1

    87631e85980d32599969e9efd67f7f4ee1daf8a0

    SHA256

    d5761935210b956af6611a9e8af98cc28fa3ed2d743353869cb01d18dda2ecb7

    SHA512

    ccda0578dad3a1e7b3a1325dd77206efb2faf2113a51da7d32a113e0d88a87d36c71c0257285088017a8f781fe153b5bd1c90809c7fb68c9a4744a4f4e91e4a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    929402ddb6b2a82985036c48750d3b55

    SHA1

    c86eebf4a3c564bc0c4524cf3364bcb1ae8ba7cf

    SHA256

    d66dd1733de547203694be29d413bd1b0bb365094660f45fdd96ddf4f4da4c4a

    SHA512

    504badeaccb1cb5a667595138fc9aabd9ebd4f4f595f4aa331b7d6d4d761b1b098db69c5d8e10b1906fbbf8b8f6757f3ea1d0ba66d6f0d9521d8a6ec61f50cec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb75772a04236ac31b96ccc6cb86d28e

    SHA1

    91d775504bed5aa60b50a4f2d2e2fe477a5cfce2

    SHA256

    45c642226818807532d9519ec6b97b24fc11c78b9e3a05ed9622f3d71ef10bbc

    SHA512

    4ffae36c3296cb3192aec8024a50030bc933dd58f79a490d88567981e6f66854d03c9fe270a61f022f39d912c1f0c31007fdc635eda6a8acbd2645ac616236d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb9d59fc883b5855119722115fe6ae10

    SHA1

    a27192ee058d0c5532d1e3e3165cb55afff471e6

    SHA256

    f758d0f385f7cac3430cf7d52a8a4f191407b3064e88ed5268f20e0aab771f65

    SHA512

    35c3893f292199219641095023531937bd67c1d7399516c9afc56de069da950449ac3082df3ae2e0aecced1c56a70903ff19b2fc3bbd1ac09753c713597cbb22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    761e1163938f62d85dd2725503f20270

    SHA1

    a0f0327d27088fa9e197fc256669b6bc5099162c

    SHA256

    fb486a7f86dafa3cffdfb68d9140aec2e36816e6636950608c22dd5a0eea3ec6

    SHA512

    f12a3d6dcf807e310ef37a9bc3d7ec4142542ec8f558f0008bd63d6d601cf83fc84d53746eac2db33bd4a689eea9abc192aa47e0260f8ade8b9c6c6d6302c662

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09ebab088ebc962af780ad26bb77b87e

    SHA1

    d95fbf4ccf8f1de470a715e3de21271684c43ac3

    SHA256

    f65f64860c695ceee36d5bc19c33202e7f4b0e58cfed50718a3611eb02795f7a

    SHA512

    d2bd8f9c179a9c83658d85a33e9c80e420ac7985b2ee0501690321587ff0c25b60fbeb7814fd68d9ed741d7baf9937dd63b946f2b9be01c7fd31677604f4996a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    957d41a50ec2fb6ede999d0f7c3cec6a

    SHA1

    79fb832ecce962faa53688789457806b098a5adc

    SHA256

    ed7f7cbb8b3cee7ac17e14148d40252a43b1d3e560edbb09777be496d014f946

    SHA512

    76c2d1354d7a14bf29b73e43c61708dc4fb49794fcd6c7d3f1781b1a23a30e3fd743f6f1ba6beec6a62454c3b8f94afae254e36c1bc23dc0d32ffd3af70c8e8e

  • C:\Users\Admin\AppData\Local\Temp\Cab5FFD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar60AB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar618C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\XcoderX.exe

    Filesize

    8KB

    MD5

    5db92acdc55ba2a3b7354c98f3a5e20d

    SHA1

    05c2ede36b80aafb9c29991c44f2799590387e25

    SHA256

    d9fabeeb71d323fe8a4aa9bb0c62989ba42bed0deea5a9d3a11fa609e9221d89

    SHA512

    f1db297674aa61b0ed34183ab15a08dba17bf4e0d915be33017ad096752521e535c6621905d388f04b641ca5585ebefb6e058cccffc5012af97c73c9f24b32c5

  • memory/1996-9-0x0000000005360000-0x0000000005361000-memory.dmp

    Filesize

    4KB

  • memory/1996-13-0x0000000005330000-0x0000000005332000-memory.dmp

    Filesize

    8KB

  • memory/1996-0-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-8-0x00000000052C0000-0x00000000052C1000-memory.dmp

    Filesize

    4KB

  • memory/1996-7-0x0000000005320000-0x0000000005321000-memory.dmp

    Filesize

    4KB

  • memory/1996-6-0x0000000005310000-0x0000000005311000-memory.dmp

    Filesize

    4KB

  • memory/1996-5-0x0000000005300000-0x0000000005301000-memory.dmp

    Filesize

    4KB

  • memory/1996-4-0x0000000001000000-0x0000000001001000-memory.dmp

    Filesize

    4KB

  • memory/1996-3-0x0000000005230000-0x0000000005232000-memory.dmp

    Filesize

    8KB

  • memory/1996-2-0x0000000005270000-0x0000000005271000-memory.dmp

    Filesize

    4KB

  • memory/1996-1-0x0000000005280000-0x0000000005281000-memory.dmp

    Filesize

    4KB

  • memory/1996-25-0x0000000005290000-0x0000000005291000-memory.dmp

    Filesize

    4KB

  • memory/1996-26-0x0000000005260000-0x0000000005261000-memory.dmp

    Filesize

    4KB

  • memory/1996-27-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-11-0x00000000052B0000-0x00000000052B1000-memory.dmp

    Filesize

    4KB

  • memory/1996-623-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-622-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-621-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-620-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-53-0x0000000005380000-0x0000000005381000-memory.dmp

    Filesize

    4KB

  • memory/1996-54-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1996-55-0x0000000005560000-0x0000000005562000-memory.dmp

    Filesize

    8KB

  • memory/1996-12-0x00000000053F0000-0x00000000053F1000-memory.dmp

    Filesize

    4KB

  • memory/1996-10-0x00000000053E0000-0x00000000053E1000-memory.dmp

    Filesize

    4KB

  • memory/1996-14-0x00000000052F0000-0x00000000052F1000-memory.dmp

    Filesize

    4KB

  • memory/1996-15-0x00000000053A0000-0x00000000053A1000-memory.dmp

    Filesize

    4KB

  • memory/1996-16-0x0000000005410000-0x0000000005411000-memory.dmp

    Filesize

    4KB

  • memory/1996-17-0x00000000052A0000-0x00000000052A1000-memory.dmp

    Filesize

    4KB

  • memory/1996-18-0x0000000005370000-0x0000000005371000-memory.dmp

    Filesize

    4KB

  • memory/1996-19-0x00000000053B0000-0x00000000053B1000-memory.dmp

    Filesize

    4KB

  • memory/1996-20-0x00000000053D0000-0x00000000053D1000-memory.dmp

    Filesize

    4KB

  • memory/1996-21-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1996-22-0x00000000052E0000-0x00000000052E1000-memory.dmp

    Filesize

    4KB

  • memory/1996-23-0x00000000053C0000-0x00000000053C1000-memory.dmp

    Filesize

    4KB

  • memory/1996-611-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-612-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-613-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-614-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-615-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-616-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-617-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-618-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/1996-619-0x0000000000400000-0x0000000000E96000-memory.dmp

    Filesize

    10.6MB

  • memory/2020-34-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2464-46-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2504-40-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2568-52-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB