Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 07:56

General

  • Target

    219d0916adff999e13abf180231ad552_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    219d0916adff999e13abf180231ad552

  • SHA1

    c2bc2c0358acf7ad957a52b1ab4d3a9305f8afe4

  • SHA256

    64c4b96fb483138ace5ac80895bd30d1d95a7e1d526b8a8eb4fe1e2f57bd799a

  • SHA512

    011383435e05883cdf884063ef5805fc7681641ab3e8ef4c192599d2c2210d09ece5c9a0b8777bc3e74177c705c605c36c821fbcce958fcea5c2ccda46aecdda

  • SSDEEP

    12288:Q6t/08n6hkAW2adY8+QGXVfo/j0ofb2s0xmPMVqeAaPcP0bMDChZ4Pu+O6odlkNy:Q6S86badYrfGLzFPMVdAD0YCqO6ob06

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\219d0916adff999e13abf180231ad552_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\219d0916adff999e13abf180231ad552_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Program Files (x86)\InfoTab\InfoTab.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2760
    • C:\Program Files (x86)\InfoTab\InfoTab.exe
      "C:\Program Files (x86)\InfoTab\InfoTab.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\InfoTab\InfoTab.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\InfoTab\InfoTab.dll

    Filesize

    102KB

    MD5

    60c65f44c089f32bf093e51bea6d804f

    SHA1

    f58ffcad9ad6117a774fd92682078990d3b28bd4

    SHA256

    142110c0aa74efd7819f79ef601e083646b6ac5f360ac24d9b03562a9bc89899

    SHA512

    62d77d75d3eeb73614947f7a52d93a6868662ade4219558c9e525f868f4eece75bb68a7d4dcc141cef6f1eac82062370574a1b58a5baf642217bd9bde3e426e9

  • C:\Program Files (x86)\InfoTab\adc.dll

    Filesize

    28KB

    MD5

    b5a015582916aaf5e054555fe357fd3c

    SHA1

    5cd3f3e861c039c67338f07a7a19eaa1fe7ecd71

    SHA256

    b7829e9f624aca60bf0662eaf6388e3db022520c759e758e289d5d308a012c05

    SHA512

    0414f82acc3c6ca8ff35d0f5e1ad72c43a8563612cc2f427583dc055e631fc0babffa67fd9629dd227d4aef3358be544d5af37e75a61744aacd42e56dca24e1a

  • \Program Files (x86)\InfoTab\InfoTab.exe

    Filesize

    305KB

    MD5

    27dd2fec09f518f5ba673c1463b08e32

    SHA1

    4975f168fc813f23d4ff8b9ad86732fcf39ee269

    SHA256

    c887b138b2c54cf8808aa0b54188a68ad6c8e023bcd8446a18ee7f4260f3e61b

    SHA512

    fe32360135d9a5769e7b714d06034fb998157947a3384fd71f19adca298162e4c7311dc1c1b69d29e443e1eeb3e826e3ee126c1ad7d8a0646e37ff56ba4c374c

  • memory/2368-0-0x0000000000400000-0x000000000050F000-memory.dmp

    Filesize

    1.1MB

  • memory/2368-15-0x0000000000400000-0x000000000050F000-memory.dmp

    Filesize

    1.1MB