Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 02:24

General

  • Target

    2aa87ab5ce413830ff83425b4f6d14e1_JaffaCakes118.exe

  • Size

    505KB

  • MD5

    2aa87ab5ce413830ff83425b4f6d14e1

  • SHA1

    df013cd708885824b7ab72583c783684ccea93db

  • SHA256

    f83177f58f95776bb644a41fb46f5fb6be1eb75102396c74f0195e82e2ca93d6

  • SHA512

    bd5af7f527945ab0d96a39355b85deec0eb85f29ae39dc32cacf2cf7288e3cb6fe8566828a5163c7511cebf94eb29db1bbb3f085647f5741a4a0933b467fb646

  • SSDEEP

    12288:LQIbwgQ/hahneoN8LwIQMQa1nkGf4RDzDVWiewOdDP0:t7QahnMLHZQa1nkGfZBD

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 42 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\2aa87ab5ce413830ff83425b4f6d14e1_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2aa87ab5ce413830ff83425b4f6d14e1_JaffaCakes118.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Windows\system32\oobe" /t /e /g everyone:f
          3⤵
            PID:2532
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /s C:\Windows\system32\oobe\pywnyxbiye.dll
            3⤵
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Modifies registry class
            PID:2860
          • C:\Windows\SysWOW64\EXPLORER.EXE
            EXPLORER.EXE /e,C:\Windows\system32\oobe\3841\
            3⤵
              PID:2868
            • C:\Windows\SysWOW64\regedit.exe
              C:\Windows\regedit.exe /s "C:\Windows\system32\UYYVHCKYINB.reg"
              3⤵
              • Modifies firewall policy service
              • Runs .reg file with regedit
              PID:2776
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Users\Admin\AppData\Local\Temp\$$306609.bat
              3⤵
              • Deletes itself
              PID:2620
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:2748

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\$$306609.bat

          Filesize

          182B

          MD5

          dc5f20b89d0f2b11423ebfc368b5d288

          SHA1

          97e072ae0eb671206add8a167dd7d0ea7a62502f

          SHA256

          4672f2ae6362dd096b60303106361ce34a6822fea8b23bc9afbccc6040bfcd33

          SHA512

          b0258099a03921f6dbca5e74fd1572c3c162463c1498fdc1ea374490cea42a7b10469003ad0dceab09b914d7f3de6d9eca7524003b7b36fa4a7f5eca3f9c3be2

        • C:\Windows\SysWOW64\UYYVHCKYINB.reg

          Filesize

          297B

          MD5

          50b72b2bed0059b588175eea41847159

          SHA1

          619047964a309fe0741b1c7c3885a9be51830d6f

          SHA256

          276e2d7e4ac745553ac271475eca94261ac496b6aa990f176efeda96c432fa5a

          SHA512

          817ceaa59a8ef510eeef507a08d87af808748617e40d1c8eadda6daffed59a606ad4b1df3951fc4e1f981949e5c7fb733afbb141a47d15c45c935be535c224c1

        • C:\Windows\SysWOW64\cefd163f9a.dll

          Filesize

          139B

          MD5

          47fb411888621e70f652d05864fcbe94

          SHA1

          8a49b7637ca70c58c8dab056d24cb55918700d19

          SHA256

          c7fccc590282259046c29946fffb1f81e8bff6f4de23d59c294d6328c6d5466e

          SHA512

          a49f182a7c21b49a607b3e66704205bce9b780c7d844ddd056122ac7121493a3d9e26be5b32b5fee782c6d60078862c6c82689df0fe4f392dc032b931f8df211

        • C:\Windows\SysWOW64\oobe\pywnyxbiye.dll

          Filesize

          550KB

          MD5

          31bf4c2449568a7fa89301efd67dab86

          SHA1

          a355a8d5b6cc40f447595b83ed806c57e012c1d2

          SHA256

          c00d8b8f30f77f39ebdd7f2f70561c059259e23d85d6654f4cb0462af7a6c393

          SHA512

          387af479a7cf4f5935bbb62863604d5e38a45aca97aeb2931770695f8c8e7fd8900446e9dad549a470faf3cc7146d168c1122a42060d8758b2b22f52624ad45f

        • memory/1240-8-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/2352-7-0x0000000000400000-0x0000000000566000-memory.dmp

          Filesize

          1.4MB

        • memory/2352-9-0x0000000000400000-0x0000000000566000-memory.dmp

          Filesize

          1.4MB

        • memory/2352-31-0x0000000000400000-0x0000000000566000-memory.dmp

          Filesize

          1.4MB

        • memory/2748-6-0x0000000003E80000-0x0000000003E90000-memory.dmp

          Filesize

          64KB