Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 12:15

General

  • Target

    3d5661b29467f8eb4bf83f6ba7c1e8ce_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    3d5661b29467f8eb4bf83f6ba7c1e8ce

  • SHA1

    d6eca5824ef7671cb1bcb9e33fd445da9cf1622c

  • SHA256

    4b05ce1e4ef18ab3bc00027ae248873deae51c58191edddb2440b434e4a3bc17

  • SHA512

    9b7e8cff2816fca59ec8b34ff68557f95b165e032443f44f6933d9d950c3df7897896771475adcfa5ffb66e310ca8537348f56bea8052a075fa12302a070167b

  • SSDEEP

    768:eNnXyiS9KHnxaVL322sRutEftKWHyNxQzTjiD72U97/zCFF7bWx:GyGHnxap23uoE8yXKjM2s/zAF

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5661b29467f8eb4bf83f6ba7c1e8ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5661b29467f8eb4bf83f6ba7c1e8ce_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\2.exe
      "C:\2.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2844
    • \??\c:\2.exe
      c:\2.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1244
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
        3⤵
        • Modifies Internet Explorer settings
        PID:2148
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s msvidctl.dll
        3⤵
          PID:2788
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2956
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2156
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2976
        • C:\Windows\SysWOW64\reg.exe
          reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
          3⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2948
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2952
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s itss.dll
          3⤵
            PID:3024
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /s jscript.dll
            3⤵
            • Modifies registry class
            PID:2176
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
            3⤵
            • Modifies Internet Explorer settings
            PID:2932
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s vbscript.dll
            3⤵
              PID:2344
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32.exe /u /s scrrun.dll
              3⤵
              • Modifies registry class
              PID:2740
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32.exe /u /s scrrun.dll
              3⤵
              • Modifies registry class
              PID:2784

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\2.bat

          Filesize

          1KB

          MD5

          e320cdbb09e69f422f8b2ff9113bc394

          SHA1

          15e3a293095376f5051230ad12269feac82e8fa3

          SHA256

          05582d2e555c46a37578076a9a668205241b6612b2064c42c920980be300e926

          SHA512

          c5a7b4ad79ef44f24991237992e9e01d64b9d5c7fed8354035863c9ceffd1ee271dbd58b1fad7474de372f2c5c7867208720fbd0928c58b15f3e94dc2a6e35a1

        • C:\2.exe

          Filesize

          21KB

          MD5

          cbbb57932d0871df880e866c47daff4e

          SHA1

          0f87729b8d9727bf0e65886798305928fe8ce598

          SHA256

          2260745a9d6815f9c750a9761a189f9469a5a464caba555416c90ba94b8652a6

          SHA512

          86e354781f4b984cceb36a8ff5e2a6698d26eb35999a06eefe5fae451fe67edd954f88bc012e5905e1595a8971b502ae3f8b667322600b27580ce3265d5c222d

        • C:\Users\Admin\AppData\Local\Temp\LQOQ02MG.exe

          Filesize

          9.0MB

          MD5

          de9d5f8459619377b8834b885e0433f3

          SHA1

          8c89a214f6b65af31e9a12aceb00c554920beeee

          SHA256

          99721df4bf9b121901e9014aceeb4c43bb629268f21238a21e1b29034ee1fb9b

          SHA512

          4269ca8b0d15269c150fde21f74a8b1659131022bbc8e081280c9ced4911604143d735f66da418ced7b9a82247651ab492440b2c1e2bdb91da9a62300431aaae