Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 18:47

General

  • Target

    3e76a68170fa6345231f3177915b1fbb_JaffaCakes118.exe

  • Size

    587KB

  • MD5

    3e76a68170fa6345231f3177915b1fbb

  • SHA1

    e0cfeafc4c55d4ab65c0a885f4f140e2aab8c04b

  • SHA256

    d490afb032c42bc292e4544a91bb757f4a21b1af889b0afbde4e30847b394a7a

  • SHA512

    79ec907c3a0cdeef813b857af1f6bf88d9a3575f5d18d6f16b66948df40877d621c4bb723344ca3dc5a4a1fbc012e9e5adc630e331f868099b0e53f9068f271d

  • SSDEEP

    12288:6CNEba4ZlZt9OHqJ5jheewGc4lhoeeViTeyJXg:0bLwHk5VBw83Lmiy

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e76a68170fa6345231f3177915b1fbb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e76a68170fa6345231f3177915b1fbb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Program Files (x86)\Cloud-Web\cloudidsvc.ex_
      "C:\Program Files (x86)\Cloud-Web\cloudidsvc.ex_" /stop
      2⤵
      • Executes dropped EXE
      PID:1060
    • C:\Program Files (x86)\Cloud-Web\cloudidsvc.ex_
      "C:\Program Files (x86)\Cloud-Web\cloudidsvc.ex_" /u
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4128
    • C:\Program Files (x86)\Cloud-Web\cloudidsvc.exe
      "C:\Program Files (x86)\Cloud-Web\cloudidsvc.exe" /i
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:5104
    • C:\Program Files (x86)\Cloud-Web\cloudidsvc.exe
      "C:\Program Files (x86)\Cloud-Web\cloudidsvc.exe" /start
      2⤵
      • Executes dropped EXE
      PID:3276
  • C:\Program Files (x86)\Cloud-Web\cloudidsvc.exe
    "C:\Program Files (x86)\Cloud-Web\cloudidsvc.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:3488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Cloud-Web\Cloud-Web_2_86.dll

          Filesize

          123KB

          MD5

          9fa385bf443861d0f80227948a32dfbc

          SHA1

          14bbdeccd9614ccd25971f7bb8cd32f5da39ad79

          SHA256

          e9f1f6605710a04f09bf72b25c9dd807726076a3e1b12f20ca3fbaa8c5bddb18

          SHA512

          3727418aef2235d379eb0dd633ac33b1fe91349cefdfd7f9b1ddcbcab703eb2a31e67cccf8df633bf25697c4953c4c428c503f919f7594eaa176c17213840b6e

        • C:\Program Files (x86)\Cloud-Web\Cloud-Web_mime_2_86.dll

          Filesize

          210KB

          MD5

          e03152320af546785839f21cefd28ce1

          SHA1

          7264e5753bb5313b9ceb69d05c15e000ed938559

          SHA256

          6807aee8007988c5409a947a526c187c66e349886399541454800ce2a99c2442

          SHA512

          93681775e96cb80b8cc4b89c788902f5070497c5a0120c0ba965c14e651ab3726387bc0d3f8feeaf315ae45bd7bf40bf37f1e2fd379b89bc812c9dd2fdfefb5e

        • C:\Program Files (x86)\Cloud-Web\Cloud-Web_run.exe

          Filesize

          127KB

          MD5

          54db07fc87755030e8c9b0547da56f91

          SHA1

          36cade3d66ca6ed2c9ae06aa8f65d9c9ff84c8f7

          SHA256

          f888a96fc2ecf7c8ce4860cbbeac7ed11a5674564dff2db23702bf307352c17a

          SHA512

          bd4cb4c975ea3515e17154b8b8742243cc1f26798c8797059673fe3537dea0ca249a89be66a05c755061df714444da86d06e47d76a12ff654eb314de9154c27c

        • C:\Program Files (x86)\Cloud-Web\Cloud-Web_tb_2_86.dll

          Filesize

          127KB

          MD5

          2323e058563e10f8cc62f18447dc2044

          SHA1

          eb9dda4d35b0e84ddeea808e1f1ee8b6ffb1521d

          SHA256

          e678e99433a683e78eeb73f1e863993478005302ad4925a0a35b07d85c35efcf

          SHA512

          061a02cd78bcaef3e8690e41cc98a8fd5d18b9f4d659e64610670f1b3c84b7eecda1aa7252b69e16edc2d1368f49f22c37c38bf297c3df7b47ee1052d1fc8618

        • C:\Program Files (x86)\Cloud-Web\Log\cloudweb_up_20240712.txt

          Filesize

          307B

          MD5

          eb3c8b7aca2a49e5da19535683206d93

          SHA1

          481d7ec56db1c8446b2d477f73a4f9586af395f8

          SHA256

          965423c4b16fab1b92bd4b267fa1efd0df8e8b02badcab564b4b7b6809d407f8

          SHA512

          9ed0ff966aee772ff9cf990f26d8c014d90719d420259e15d0d7103ec4f9138bd40d187849ac3d361a4e89d84fc57e797732385c3121102ea1ca7e780c6abd6b

        • C:\Program Files (x86)\Cloud-Web\cloudidsvc.ex_

          Filesize

          107KB

          MD5

          44cd4eb4d58daf2f62159ab0992787d1

          SHA1

          3f071ab5670933d644185cd0570c96f812374c27

          SHA256

          6a88c08e4fff37967d85056a475bb2970b4bf53049a3d18afebfe090f5083be1

          SHA512

          8d45fea41491e4eddb9785c7cacdc63cba28f8950ffc9db6edc7f2746c3f9f7079c6ef38925cdd307c4373d5d57cdcb9b459bb5d24d358322b06339c05693c3a

        • C:\Users\Admin\AppData\Local\Temp\nsj782E.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • C:\Users\Admin\AppData\Local\Temp\nsj782E.tmp\newadvsplash.dll

          Filesize

          8KB

          MD5

          7ee14dff57fb6e6c644b318d16768f4c

          SHA1

          9a5d5b31ab56ab01e9b0bd76c51b8b4605a8ccce

          SHA256

          53377d0710f551182edbab4150935425948535d11b92bf08a1c2dcf989723bd7

          SHA512

          0565ff2bdbdf044c5f90bd45475d478b48cdbd5e19569976291b1bdd703e61355410c65f29f2c9213faf56251beb16d342c8625288dad6afc670717b9636d51f

        • C:\Users\Admin\AppData\Local\Temp\nsj782E.tmp\nsProcess.dll

          Filesize

          4KB

          MD5

          8f4ac52cb2f7143f29f114add12452ad

          SHA1

          29dc25f5d69bf129d608b83821c8ec8ab8c8edb3

          SHA256

          b214d73aea95191f7363ad93cdc12b6fbd50a3a54b0aa891b3d45bc4b7b2aa04

          SHA512

          2f9e2c7450557c2b88a12d3a3b4ab999c9f2a4df0d39dcd795b307b89855387bc96fc6d4fb51de8f33de0780e08a3b15fdad43daeaf7373cca71b01d7afdaf0c

        • C:\Users\Admin\AppData\Local\Temp\nsj782E.tmp\splash.jpg

          Filesize

          631B

          MD5

          d68e763c825dc0e388929ae1b375ce18

          SHA1

          7951a43bbfb08fd742224ada280913d1897b89ab

          SHA256

          25cf0f0ce42f8acd9ea6facc223f54105c7fd0cce63fb7bb5d83e6600100acbd

          SHA512

          1e146e2631a4f3bd091905ccc10ed1054700349648cd52aad24eaeeedff0fac4b44b6212284a6d0855942ff16308c66402ecb895e68ef1c66dcd496973043cdb

        • C:\Users\Admin\AppData\Local\Temp\~nsis\Cloud-Web_nad_2_86.dll

          Filesize

          551KB

          MD5

          ae7c5f2888f87f8c329cea3dc4933424

          SHA1

          bf893e229f2082f57bb7618e93334bef97ce5480

          SHA256

          c5c82a44a65db162cc2878c0363b95e64205e7d08d115fd3a84ed1db8f9bbd54

          SHA512

          a60a31e6da49308c83b4bdeea62366f01b968121b3e2f168815344a7b4f2497b7a4ab8042542677126b8f02b079a82f5bcfa2c642bef5622e9a4e7aa1fed0229

        • memory/4796-51-0x0000000003820000-0x000000000383F000-memory.dmp

          Filesize

          124KB

        • memory/4796-64-0x0000000003860000-0x00000000038ED000-memory.dmp

          Filesize

          564KB

        • memory/4796-16-0x0000000002960000-0x00000000029ED000-memory.dmp

          Filesize

          564KB

        • memory/4796-58-0x0000000003820000-0x0000000003840000-memory.dmp

          Filesize

          128KB