Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 14:29

General

  • Target

    3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe

  • Size

    285KB

  • MD5

    3dc2e79662807b9a4da83b66f3efef76

  • SHA1

    8b1d01a10b71d674a5919ff9b52f7f7562e4d263

  • SHA256

    85716a22aa720acfe48e2d1a9882984006413d766adf3d42df966677826e186e

  • SHA512

    cab95012c03d1da827ba049b72fe0687cf39e8abcf74abf18c7f8cbc4a27f5ea758eaddd38b10baf4304d0728d5a388a519399c59165e5aa16962f38f63227a1

  • SSDEEP

    6144:kYf6JhBit/tmzEnxhC4wUFr+9C4JqsTZ3BwGoYm4u0QFWeH:XaBitjwUFr+/qsThBw9350c

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\88C63\076EE.exe%C:\Users\Admin\AppData\Roaming\88C63
      2⤵
        PID:684
      • C:\Users\Admin\AppData\Local\Temp\3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\3dc2e79662807b9a4da83b66f3efef76_JaffaCakes118.exe startC:\Program Files (x86)\63CAD\lvvm.exe%C:\Program Files (x86)\63CAD
        2⤵
          PID:3028
        • C:\Program Files (x86)\LP\EE48\421F.tmp
          "C:\Program Files (x86)\LP\EE48\421F.tmp"
          2⤵
          • Executes dropped EXE
          PID:2552
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2252

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\88C63\3CAD.8C6

        Filesize

        996B

        MD5

        a7f80e8ee436fe102e2ca55fe77e10ae

        SHA1

        0fc6da5937c6d3bbcb161818ce5a9f0f4fe20efe

        SHA256

        72f30349ce8182e653565b4d15229e3a655809a7a40cba415438d8b8180cce10

        SHA512

        0318a63e1ceabd13035fbb6000d34528ee06e91a9744d7307cbdcfc5ed04120e7e56877a9d285b3ddd0b995de78ff74be4c9ae81615523ee6b794e5544ccbaa8

      • C:\Users\Admin\AppData\Roaming\88C63\3CAD.8C6

        Filesize

        600B

        MD5

        2a877959a17c7093374af9947a30da42

        SHA1

        436fe01b1f8cca5818e922f28884d0c92005f6bd

        SHA256

        18ca5a6a9babb806c3a765a98b38077a768b502da1ed1c375bb11c9edb8800c9

        SHA512

        bb1d2f8b8cb3b2e4788df73fd8299dbe57c4811b31758afdef45ff12038da78767394a625e56ca166fd2b11ad1f3ba47f2d93b2f5dd7e1ca7413206697806e1b

      • C:\Users\Admin\AppData\Roaming\88C63\3CAD.8C6

        Filesize

        300B

        MD5

        24878e6e6456ce652190c171c645a1f8

        SHA1

        592e95bdd24e5f022d8002398bd0ef78500b6f11

        SHA256

        3b5ddbd410c790f8d455f78fd6dc0b38de756751550411c91db1681bd400a52e

        SHA512

        cd2c26b6a55b553c13f7f3bc561be51a132230cc28103e376f7e5c07245ff122c097aae9b432e9e5f33b1f73c78894a4e43f8d8e243fa6634d670d55089912da

      • \Program Files (x86)\LP\EE48\421F.tmp

        Filesize

        101KB

        MD5

        debb2016f85b326c4b77fbedd9718e10

        SHA1

        27c4366a0b61240d1cb6ceec6901a77f085d96e9

        SHA256

        d45a36a5503f09a0c5e808289a5ce61549b678339163cbfc7ddb6b646e1354f0

        SHA512

        6230c1ca879f5fa22d7982ff2d1795f8fcd85e9c3e8ac400474f0b8084f8530e417f62e8cf20f41f865a86c3acaa48d3e872b087729112dd2ae0e3c78890ecab

      • memory/684-75-0x0000000000576000-0x00000000005BC000-memory.dmp

        Filesize

        280KB

      • memory/684-74-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/684-73-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2144-2-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2144-175-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2144-72-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2144-234-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2144-1-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2144-371-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2144-375-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2552-372-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/3028-179-0x0000000000656000-0x000000000069C000-memory.dmp

        Filesize

        280KB

      • memory/3028-178-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/3028-177-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB