Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 06:40

General

  • Target

    24f9d4d31b60d0bb1d0426cdd4c73f20_JaffaCakes118.exe

  • Size

    143KB

  • MD5

    24f9d4d31b60d0bb1d0426cdd4c73f20

  • SHA1

    f54f13f35260f55cd08a3de5ea790431c47cd1c0

  • SHA256

    5055283c3cadcdf5cd027d50ee3db19aebc9adbd04d11e2897296eed1edf7004

  • SHA512

    c8b640c06a6afc8c46873556fe282c6cc9f50c42d38cdee5ce2a97983731ee470632403d332b17a090e236eebf76795895bd9f7f6b458a34c95a901ce16e04da

  • SSDEEP

    1536:nyqdahk08vPzRg6Jj5qesYHcRv75KCGaEFhYgw4ziQelYUfcBiubdzLsFVlxVGxe:yWZvPa6Dqx75KCMWgpsJuVMVlxB2u

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24f9d4d31b60d0bb1d0426cdd4c73f20_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\24f9d4d31b60d0bb1d0426cdd4c73f20_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\LayerMini.exe
      "C:\LayerMini.exe" C:\Users\Admin\AppData\Local\Temp\24f9d4d31b60d0bb1d0426cdd4c73f20_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2144
    • C:\LayerMini.exe
      "C:\LayerMini.exe" rb
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2456
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\LayerKavsp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s vbscript.dll
        3⤵
          PID:2508
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s jscript.dll
          3⤵
          • Modifies registry class
          PID:2496
        • C:\Windows\SysWOW64\reg.exe
          reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
          3⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2524
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2388
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2632
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s itss.dll
          3⤵
            PID:1896
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s scrrun.dll
            3⤵
            • Modifies registry class
            PID:2420
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
            3⤵
            • Modifies Internet Explorer settings
            PID:2888
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s scrrun.dll
            3⤵
            • Modifies registry class
            PID:2920
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s shimgvw.dll
            3⤵
              PID:2212
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32.exe /s jscript.dll
              3⤵
              • Modifies registry class
              PID:2536
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Enable AutoImageResize" /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2836
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2380
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2060
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:1216
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:1500
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11cf-96B8-444553540000}" /v "Compatibility Flags" /t REG_SZ /d 00000400 /F
              3⤵
              • Modifies Internet Explorer settings
              PID:356
            • C:\Windows\SysWOW64\sc.exe
              sc.exe create ccosmSrv BinPath= "C:\Program Files\StormII\stormSrv.exe /asservice" type= own type= interact start= auto DisplayName= GooglePersonal
              3⤵
              • Launches sc.exe
              PID:1004
            • C:\Windows\SysWOW64\sc.exe
              sc.exe description ccosmSrv "Contrl Center of Storm Media"
              3⤵
              • Launches sc.exe
              PID:1948
          • C:\Program Files\PathYahoo.exe
            "C:\Program Files\PathYahoo.exe"
            2⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            PID:2752

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\LayerMini.exe

                Filesize

                24KB

                MD5

                2d128cace571fdfd3b523aa6a4d2fac4

                SHA1

                dc09144631e2827fad91eb6d09b44b0ea228abcc

                SHA256

                abed07b98057cdf447084daf89b921f423c1c3f8287eb886966bd1d7d01f8e46

                SHA512

                71d47364882af5b076c39491813d5bf2f522f03dd8573d4b9bb419d91a705d32a50d621c10b39ea54524e789032ae25b1919b188a3a037ca35084506b609f128

              • C:\Program Files\LayerKavsp.bat

                Filesize

                2KB

                MD5

                641984e0f42bdf661cddf53252ae553f

                SHA1

                58e0d6636f22c850bf992ede3e6787ea5841d7d6

                SHA256

                624b5daae23210e6b3a62e7c0de38124b34989ca30ca44b127372b37c34c991a

                SHA512

                7c3a76fc76342298ff5b2f3df20e8a5f476ebc670e5c4f30bbc05157016527ab4eda4852a62784c2761cf49fd342625c2a20c0c9b47a4bc353cd0832433dfe5c

              • C:\Program Files\PathYahoo.exe

                Filesize

                143KB

                MD5

                24f9d4d31b60d0bb1d0426cdd4c73f20

                SHA1

                f54f13f35260f55cd08a3de5ea790431c47cd1c0

                SHA256

                5055283c3cadcdf5cd027d50ee3db19aebc9adbd04d11e2897296eed1edf7004

                SHA512

                c8b640c06a6afc8c46873556fe282c6cc9f50c42d38cdee5ce2a97983731ee470632403d332b17a090e236eebf76795895bd9f7f6b458a34c95a901ce16e04da