Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 11:21

General

  • Target

    38e7786d7dda5cbeb1577bf87557d205_JaffaCakes118.exe

  • Size

    183KB

  • MD5

    38e7786d7dda5cbeb1577bf87557d205

  • SHA1

    c21ebb3e821deeec7dcea9550681844fcaf3fb29

  • SHA256

    6bd7a6db3b753b83466251378046f326a3e76404121e16959812c326a3a8712d

  • SHA512

    7a709047d428ed583d52e73b6505cde500e82cba125ae65221ed8fe46de5b4f2736b4b73a72a4e46d679131dbc90e78ac7bf075540834aafa9a8ad38c04e8465

  • SSDEEP

    3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVt:Eazq3aipalYuhoao5sQkz1Rv6O

Score
8/10
upx

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 4 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38e7786d7dda5cbeb1577bf87557d205_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38e7786d7dda5cbeb1577bf87557d205_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Windows\iaccess32.exe
      C:\Windows\iaccess32.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\tmlpcert2007
        3⤵
        • Manipulates Digital Signatures
        • Runs regedit.exe
        PID:4324
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Windows\system32\egaccess4_1071.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:3060
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:1960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Instant Access\Multi\20110128140114\dialerexe.ini

      Filesize

      668B

      MD5

      3be1e03a2c30d72c8302f723102251e5

      SHA1

      58767ae471dac9bffa75c98e492723b3f0736858

      SHA256

      50d8828f8c00c6b6ce071c5e86df01f8f64f9807f5ec8c8eed4bd11c019b2bb4

      SHA512

      62077f9f5b0125101f80139c09e6ec91e5666bd7d1a44042a72713ca721c688627ff5f1598875d82dde97c450b06365771063920044ed8f3595c8200e8f0f939

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\NOCREDITCARD.lnk

      Filesize

      2KB

      MD5

      3958c64424a68fc3c0898dbe80c5431f

      SHA1

      ce696e45602b857ee33ea4b536c38a0b5c6a284b

      SHA256

      9d167e7f280e8cc94b8792599a00dcfcefaf03db803293378461c278cdad0f9c

      SHA512

      729ee6d60f89937ed15ed969b1a6c3ae0ada687576241cebd91f91feef128dd1940594159b652edf6633fc07fd0442a2403455e619a327cdcf07380d8b471507

    • C:\Users\Public\Desktop\NOCREDITCARD.lnk

      Filesize

      2KB

      MD5

      b9d1eeb825d1954c4f4087dd328d1a40

      SHA1

      199a18c824fb713f65c8962569c8a245523f4ce4

      SHA256

      cd8babd54febdd22a62b58413d9fa1b78d2191073cafb7b07b1d997ce74eb481

      SHA512

      8b168da9d48d65edd3a2c40103660f55414f6373b6e6ec6fa4937a062d5d7b180f239ea9d6e8ab22b27feb70a7cf0939d6c981c863080c33e919a3ee86649c71

    • C:\Windows\SysWOW64\egaccess4_1071.dll

      Filesize

      76KB

      MD5

      b83f652ffa76451ae438954f89c02f62

      SHA1

      b3ba0014dd16cee5f6d4cfe7e28b2d5de79dc6dd

      SHA256

      f601991aa00cbe7001197affc0e3854ab76c51c05b9a6ca3e3f708fed876c32f

      SHA512

      965172a5ecd070ea6707ec9985ee3c135c06534561b90ae233e8049b247d87d529b8280f0faf2b0ed933f59c68844414726fa80c4d3119cffa4fdd1cb60eab83

    • C:\Windows\iaccess32.exe

      Filesize

      183KB

      MD5

      ae85dd75b77f061fbb27f957fd8067a9

      SHA1

      f671f8ec3bd2779b0299779794441aa9f3607608

      SHA256

      c0bd73c5ed27a1cb6448d3536eaef9b05544e55b513dcd9d341fe17658e732b6

      SHA512

      3cc6a9f34d6b3ce4c03dff7a8699b2e9f9fa1fa6295f0b68c56089dafbe467da2858ce460ade72666a9906d6ce1e1a61c2b66cdc691c808e4d9e8c554be13a77

    • C:\Windows\tmlpcert2007

      Filesize

      6KB

      MD5

      b103757bc3c714123b5efa26ff96a915

      SHA1

      991d6694c71736b59b9486339be44ae5e2b66fef

      SHA256

      eef8937445f24c2bcbe101419be42694e0e38628653a755ab29ecba357d81d48

      SHA512

      d04f2ab14ad4d3e06ea357b4c810515d73b32f2650533a5895ebf5d14b4b697752f25c0c371372e00faab661c0b051c33b8c25bf1226f30be5d6b8727dea81e1

    • memory/2948-5-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2948-57-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3536-0-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3536-4-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB