Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 02:20

General

  • Target

    18710a96c1b08c9cd91872b746f8a647_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    18710a96c1b08c9cd91872b746f8a647

  • SHA1

    c4b85224a36cd317b3ff6bf331e0431c82d1b939

  • SHA256

    4b496916855de6c021abdb1731fa7e5197c7d1e996d1e0f46b17323e64dc753e

  • SHA512

    2f523faf2496901131440da430a6a8ece450fbf1eaceac99da03b9cdb74678b27d30f2473766c489fbf153392bb23827b63cfbcca78886b0e2bb3ab47fda0b77

  • SSDEEP

    24576:CJdbgsjrpQoIEBihT43QdCO3oV3QytKW2YMHPSgQwCeEbPxB+Rrg8HrIsiRPPKC:BMqtthcDQCKW2YMHagQq6xCrtqdyC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18710a96c1b08c9cd91872b746f8a647_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\18710a96c1b08c9cd91872b746f8a647_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:100
    • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
        "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        PID:3588
  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe
    C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe
      "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini

    Filesize

    27KB

    MD5

    62d5f9827d867eb3e4ab9e6b338348a1

    SHA1

    828e72f9c845b1c0865badaef40d63fb36447293

    SHA256

    5214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5

    SHA512

    b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe

    Filesize

    600KB

    MD5

    b3fd01873bd5fd163ab465779271c58f

    SHA1

    e1ff9981a09ab025d69ac891bfc931a776294d4d

    SHA256

    985eb55ecb750da812876b8569d5f1999a30a24bcc54f9bab4d3fc44dfedb931

    SHA512

    6674ab1d65da9892b7dd2fd37f300e087f58239262d44505b53379c676fd16da5443d2292aeaae01d3e6c40960b12f9cac651418c827d2a33c29a6cdf874be43

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctor.dll

    Filesize

    76KB

    MD5

    003a6c011aac993bcde8c860988ce49b

    SHA1

    6d39d650dfa5ded45c4e0cb17b986893061104a7

    SHA256

    590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a

    SHA512

    032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuser.dll

    Filesize

    172KB

    MD5

    377765fd4de3912c0f814ee9f182feda

    SHA1

    a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1

    SHA256

    8efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb

    SHA512

    31befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objectps.dll

    Filesize

    32KB

    MD5

    8f02b204853939f8aefe6b07b283be9a

    SHA1

    c161b9374e67d5fa3066ea03fc861cc0023eb3cc

    SHA256

    32c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998

    SHA512

    8df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59

  • C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll

    Filesize

    220KB

    MD5

    b2f7e6dc7e4aae3147fbfc74a2ddb365

    SHA1

    716301112706e93f85977d79f0e8f18f17fb32a7

    SHA256

    4f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1

    SHA512

    e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\IKernel.ex_

    Filesize

    338KB

    MD5

    93b63f516482715a784bbec3a0bf5f3a

    SHA1

    2478feca446576c33e96e708256d4c6c33e3fa68

    SHA256

    fbf95719b956b548b947436e29feb18bb884e01f75ae31b05c030ebd76605249

    SHA512

    2c8f29dda748e21231ab8c30c7a57735104b786120bb392eb1c20a320f2dddde392d136fd0c70853bb9af851bbe47df2955d8f9d5973b64870ac90bd12d2dd70

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\Setup.exe

    Filesize

    55KB

    MD5

    1aeb989e361af85f5099de3da25457f4

    SHA1

    4f494142e3fb00c6d6845525cd4540ba3f7be9ef

    SHA256

    ab9e0291a763efc32e84e7117f9a0fbc99b681c96df0bb27a66433a726667e5c

    SHA512

    0ecd71f3deb154c8f48ec278822820f41ab15c6efe76b00b8f6a95e28a62a97fbb8c44eb38293cae3fe3a0fe29fedbc660671885c4e3f7eb0016b6dbf3b4b273

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\data1.cab

    Filesize

    455KB

    MD5

    9df3885520f0df81df8a365113c11130

    SHA1

    1d95d3179b186b4b8e23edd72693118ac58aa213

    SHA256

    95ef91c60cdeb1d0c03e63709352f825c3a809a7eb402c797164b9a8763fd870

    SHA512

    71701d04e8527135b5567e39b1611c7d764d27d1cb3e83f5f11e86d37966916b2db3fbeeddae3cf483ae316c91a6ac7273c0923fdbb74efd9b9c332c37a32bbc

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\layout.bin

    Filesize

    435B

    MD5

    c65e0edbbd1ea65c31dc3650edeae3f3

    SHA1

    63b4a469c0572e5735b94aea7f0a83f1d470c76c

    SHA256

    65f87f4b67b855248a4de67f99016ce190fece88ad21baac130114484b0fd49f

    SHA512

    5a696d1ee6fd56121a62e2b5c2355d4be0ffdee4a1a7ed9373a867af76fd48e48c821553e16e1cebfa208f39888fe6818f35981235ce0b0568aa1454f2195bbc

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\setup.ini

    Filesize

    141B

    MD5

    f4ba36d5009733e23461b9ce919a75d8

    SHA1

    aded8444cc5f54eeb766694abeb2805788b1557d

    SHA256

    171a3a4a78e92fe235fe549acb74d35ec57f457c3a34dc54f37624c2f15d4590

    SHA512

    031434300c7a30f17d458e8b51dea5825f7b482c9769eca19a76de95bf2102157916890cd450dd915df2eaf607207c19e174b68607e4525291fbfcdfa3e03d8e

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\Disk1\setup.inx

    Filesize

    126KB

    MD5

    6c3a4d3499f6bd68ce1bded15973ca34

    SHA1

    b21ce4d86acf6e6848fef69aebf666877e6f9e06

    SHA256

    0a49218a2ca63f7d6fd4c09d5732a2d4cec968d8c8caa415aa7cd596e328ccd1

    SHA512

    dfbea3d0b892be4b0f36138770ddf008cee8eeede7e6476ba578d417b8320b367649f709b28ee7cf667b909b1c27cfbddbdb830aa18e755d89d5d7f7a20d4700

  • C:\Users\Admin\AppData\Local\Temp\pft45F4.tmp\pftw1.pkg

    Filesize

    1.2MB

    MD5

    362e99a642a95b32b0475d56efb5987b

    SHA1

    87dbafbd8f62b0d793295e71fc3c6286079a3262

    SHA256

    ddc34a0f85bdb8ad569a0df5d71c852eb01d84adb578da20b928fc87392cd828

    SHA512

    a67742518699deeadce719d1d4dcbc3df347d0f79ac7337403b1e55ac9dfeb60cd573824c6786548a1612f671b1533f383d18e5fe1257f2dd1092cb9159eb0d9

  • C:\Users\Admin\AppData\Local\Temp\plf4565.tmp

    Filesize

    5KB

    MD5

    9efcc61a0baa38a6d7c67a05a97c7b87

    SHA1

    72b713a72ef7e972dfd5be5f79da8e9aacedb296

    SHA256

    7ccb3a50ca08c66a220e4da614cbaba1d05157359edd174223c788b86d929edf

    SHA512

    ac57100b76826af9f7650417dd765c23b522e31a1f3b44bfe9e70ed520bf6c6eb1978118a8147c99487b05a7a4c4afc964f457b79f921ff8236e4d60561b1238

  • C:\Users\Admin\AppData\Local\Temp\{C3ABE126-2BB2-4246-BFE1-6797679B3579}\_IsRes.dll

    Filesize

    252KB

    MD5

    48ea604d4fa7d9af5b121c04db6a2fec

    SHA1

    dc3c04977106bc1fbf1776a6b27899d7b81fb937

    SHA256

    cbe8127704f36adcc6adbab60df55d1ff8fb7e600f1337fb9c4a59644ba7aa2b

    SHA512

    9206a1235ce6bd8ceda0ff80fc01842e9cbbeb16267b4a875a0f1e6ea202fd4cbd1a52f8a51bed35a2b38252eb2b2cd2426dc7d24b1ea715203cc0935d612707

  • C:\Users\Admin\AppData\Local\Temp\{C3ABE126-2BB2-4246-BFE1-6797679B3579}\isrt.dll

    Filesize

    324KB

    MD5

    61c056d2df7ab769d6fd801869b828a9

    SHA1

    4213d0395692fa4181483ffb04eef4bda22cceee

    SHA256

    148d8f53bba9a8d5558b192fb4919a5b0d9cb7fd9f8e481660f8667de4e89b66

    SHA512

    a2da2558c44e80973badc2e5f283cec254a12dfbcc66c352c8f394e03b1e50f98551303eab6f7995ac4afd5a503bd29b690d778b0526233efc781695ed9e9172

  • \??\c:\users\admin\appdata\local\temp\pft45f4.tmp\disk1\data1.hdr

    Filesize

    14KB

    MD5

    686ecb86002add82542396989fdc7de2

    SHA1

    eaf57250468148e063ed0a0bdce8994899fdbde8

    SHA256

    1f4ee3f0c26c42d493ef6114142ff5359e1367d03959ca90f8b7181785bc0cb8

    SHA512

    45e77934dbcca602b573a6c9a03c6a770855c084e8ecad86fdfd8fa30e387ad6db1572a5ae510107561e81f88506a09a68cdbcaf0fe9f4947604cbc81e226c8b

  • memory/2316-145-0x0000000003220000-0x0000000003258000-memory.dmp

    Filesize

    224KB

  • memory/2316-139-0x0000000003200000-0x0000000003213000-memory.dmp

    Filesize

    76KB

  • memory/2316-159-0x0000000003760000-0x000000000378C000-memory.dmp

    Filesize

    176KB

  • memory/2316-153-0x00000000035C0000-0x0000000003613000-memory.dmp

    Filesize

    332KB