Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 14:20

General

  • Target

    1a739351a3640859f1df8720c2525880_JaffaCakes118.exe

  • Size

    3.3MB

  • MD5

    1a739351a3640859f1df8720c2525880

  • SHA1

    13f8f187a54984cd28c95a471294e572eaa1ee00

  • SHA256

    5007aa60796767f78c24c889d6b341d19139910cc71990d1e28472fdda8e571f

  • SHA512

    3ca9b1e580c55d410286dc4ed9cdf014bacb580624a1f839859e1d42ba08aba7564cb730eed3fe71da3384425c60f66767a3138774ecc3bd5c4da3dc14c31473

  • SSDEEP

    98304:/Mo8x3cPQ11zBBhgickr49JteX7e6LZlGMpB:UoAcPQ1Th09aX7e6PGMH

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 25 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a739351a3640859f1df8720c2525880_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a739351a3640859f1df8720c2525880_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • Modifies registry key
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9da8e400292d65bb21198b21bab0d3f4

    SHA1

    e7421a8ae5824e136b66db01f6a441c084e04395

    SHA256

    d94e8bf6df044e04c6410e1f51c36f3dbbdce45f4679a711611404a1dc31754b

    SHA512

    9fc52bb0716bbc0ae695edb8cd007adf1d8d65812ec622e82f316a6dc208f2841b224b2d4bc468c0115d33225b9dbf8ebb36c69a425a6530c7fd17381d72129f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c187b2676d9b1849ea967fb0afbd45d6

    SHA1

    207c08755d748599d174dfa0dfff384b2748d388

    SHA256

    ee8d0ddfeea97259ba0d94f8fe9bde4d5f4a6047355739bfae54c0bb0ad16329

    SHA512

    1348b23849fac85c8d03bf39e557c6c56f223359ae3ae5d12faf6efc1e40a1f8a4f2bf5f7be6c1dd885c6308487902171a63e606da6c1a9e8195bceca9a71086

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eca66047581d13f81243664ee5eb8c46

    SHA1

    4a3a5914a0fd805bcf8027efc6e5f612e071e2e5

    SHA256

    48522681f439a02c4a79b99527e51324a446d76080bd1621aff9b60df1a45f2a

    SHA512

    d45a84ff3e10612feb03d31c77f942e23500d20892bcb7c0533996654fb24d22e7df97d03a33b315931b6ed761e5104d56c4ab480ac9b32d83210c1944359ac5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c3fdf0df18d1d55ce7cd4cbddb7955f

    SHA1

    fa10a66af85a85292fa6e8d641dc26ecdb0cbe13

    SHA256

    5850b49f410cf806824aabcd83bb555410b54f6e7bad0f7532a7566ccef346fa

    SHA512

    df3235efd599351dfe7948e0e5c8641dc927d996b175e357581619749b87bc4116c82f9d3f055121ff0a338ffb260ac15d51e38d733f5e50c2089a827048ff7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a072424a3cac820dbbf3e78a5c7e4e9c

    SHA1

    d74cf0765b1df40fb418e19d0fdc2d6ce0df00e0

    SHA256

    493cb70c59ff3af43f637fb9a04d0f5fd13187633fadd1e52e5bd7ba6332ce05

    SHA512

    e13be0356ff8097271491d3c443988af320f0fe2f8db25f7d0d74544507e46ab1e2748c9b33d7dce18f55f4f286e481749bb2e7c422dbf630841ee38a793e3b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    096fd4850925ef7b3974dc0d0c0e4bef

    SHA1

    3b2ce72640a09acd6b350c5e120cd7db9bf6f327

    SHA256

    d95f6a0dd6e5a68bd902fb226dd51374a5f967f421b524298dbd5311302eb142

    SHA512

    ddc187c12ec8cc79173e3f0f00b7a5e30fe1525a0a79a7728bcb03394c391092892ad494fb4807f447d7ef8fe0b8c1a8827a74f2dc9ee0c8cc8dd842d32b7d00

  • C:\Users\Admin\AppData\Local\Temp\Tar7DCE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1976-10-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-330-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-12-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-11-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1976-9-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-70-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-8-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-108-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-7-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-122-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-6-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-203-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-3-0x0000000000401000-0x0000000000478000-memory.dmp

    Filesize

    476KB

  • memory/1976-0-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-1-0x0000000002D00000-0x0000000002DED000-memory.dmp

    Filesize

    948KB

  • memory/1976-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1976-331-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-332-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-333-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-334-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-335-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-336-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-337-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-338-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-339-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-340-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-341-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-342-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB

  • memory/1976-343-0x0000000000400000-0x00000000013D6000-memory.dmp

    Filesize

    15.8MB