Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 20:17

General

  • Target

    3ebd5f4ded0c75e7f67b3db28b84bf5f_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    3ebd5f4ded0c75e7f67b3db28b84bf5f

  • SHA1

    1d99ea9979a89332f83ee802e54e03a4db1652e1

  • SHA256

    6e64fd50cb9d38dceb3e6100794f3c11e3b8a458f6265b80101f1d976ad5564f

  • SHA512

    8b5c46ed3b3a8bd6fcd59aa662a26632d400780c5bbe7430752813a1a8f189028af1c22abb7a512533fa68fda4fdd007c16b89509d5407c22543371bf169d870

  • SSDEEP

    49152:3X3cC99eprWnVNCLaZzCfB43ejbu7BqSXO5YytTEdg:nspprFL/4a6VoDES

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\3ebd5f4ded0c75e7f67b3db28b84bf5f_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3ebd5f4ded0c75e7f67b3db28b84bf5f_JaffaCakes118.exe"
        2⤵
        • Drops file in Drivers directory
        • Sets service image path in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Installs/modifies Browser Helper Object
        • Writes to the Master Boot Record (MBR)
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 "C:\Windows\system32\IEHelper.dll" -s
          3⤵
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Modifies registry class
          PID:2244
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 "C:\Windows\system32\NTDLL32.dll" -s
          3⤵
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          PID:2940
        • C:\Windows\SysWOW64\internet.exe
          "C:\Windows\system32\internet.exe"
          3⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetWindowsHookEx
          PID:2252
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe setupapi,InstallHinfSection DefaultInstall 132 .\mspcidrv.inf
          3⤵
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\SysWOW64\runonce.exe
            "C:\Windows\system32\runonce.exe" -r
            4⤵
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:752
            • C:\Windows\SysWOW64\grpconv.exe
              "C:\Windows\System32\grpconv.exe" -o
              5⤵
                PID:1552
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Windows\Downloaded Program Files\847095\NTDLL32.dll",Run
            3⤵
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1716

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Downloaded Program Files\847095\NTDLL32.dll

        Filesize

        405KB

        MD5

        a11f3270131a300ed63373e3967aa66c

        SHA1

        a2763e490b3eb3c05a497e97177302d79c66edb3

        SHA256

        e3c9bdb1995bb628a3869ad14f7da73acee0303857c3c7fb800a4f9d67f528e9

        SHA512

        8981a7b7205f279f075512e1f0a0ce7599d392b3323b3a325b12fcb841c702cdcf2a4a0f3956c00582471421f1ec7c5d862beebbfbb73a11e76ba08902f8436f

      • C:\Windows\Downloaded Program Files\847095\mspcidrv.inf

        Filesize

        2KB

        MD5

        e3bc0a6d0011382cbd78f76de9c64337

        SHA1

        a8fac2ff69aa438d0d2bef7949b02a7783a9e761

        SHA256

        8a99894441243e3b0340e3d835e29f91cfd1d22289c8359f9c0d6ca0f0f831c4

        SHA512

        1154dedb01e76ea2b77b37fd2ae10e756519e922969e986487408df15550846ecba606826a58fe3f78e99ee7874f63adc9535cb9ad0e12b025695252fd4e356a

      • C:\Windows\SysWOW64\CharSet.dll

        Filesize

        208KB

        MD5

        eb7b696154c5a2606e4380ed033b6933

        SHA1

        d2730d9c0db43c617a61a5a955c165321b112ae9

        SHA256

        69587c9ec06428abe8341db486df980cbc7f44db93dfe609b6dd740bc03b8eed

        SHA512

        9de806a59e925c1bf4a77cfdcb981548fa4d0767ef28335b47cc772ec053bc8f32b2e828b09a87e8648170af29cc9198c82eee6daaffb85c9a04b7fbfb55e333

      • C:\Windows\SysWOW64\CreateDomTree.dll

        Filesize

        308KB

        MD5

        8f0d398ee510dfe14d3d7c0e59f5a3f4

        SHA1

        5e98508c083ecb59d94657309d716d52d3188c9f

        SHA256

        fb823d0df53245686cc67f04aceca143b35a31c4009c2d850258ef7e30af6abd

        SHA512

        540ca0c8e453cb8552ca7ab062ee1284d7c708a3c0de74ee3d198fd7a2b778878be2628fcbd52764629b1addf6949ecbeca9194e1c0d7d8190c11f6cf6ab78e6

      • C:\Windows\SysWOW64\IEHelper.dll

        Filesize

        222KB

        MD5

        4a173f6aa173f8ded05abb044cdd5111

        SHA1

        8e7c54810fcb33acbf59d6f470e36ce22ef7ec62

        SHA256

        e62df5ec0421223c79497118bca5ac98ab5aa34e65052971b5f8925c6c28ed02

        SHA512

        ea91d6c697d38fe5fd2a8c1efd567be3eb23a1098bf000a1f540c879cfe69a741c44dfeff13efeb940990edab1daab34a5172b0548dec8f4e2e77c7a40511ba9

      • C:\Windows\SysWOW64\WebPageParser.dll

        Filesize

        148KB

        MD5

        c0c113ec59cbce8b7d1bd54524643d0c

        SHA1

        ebafebf8eabeb3c61c661933e8ef3f70c3bee4b6

        SHA256

        49daa3a5dc31b2f679bf0095dfa11adeead8817b3446ca3aed33a3ffec238917

        SHA512

        6c4fc79119b1dc0404368e018dbea5217329dbf28c9cf64bb7e55733ed686fd1bed42c5032fe71a5f01ccc31fe3289468b6a08e633f9cc0df5a91135883d86c4

      • C:\Windows\SysWOW64\drivers\mspcidrv.sys

        Filesize

        42KB

        MD5

        738583d7595c2755ec909ef2082f6c29

        SHA1

        4a21247df5bd8c1a6be5088c26b873312769d5a5

        SHA256

        d96375035779b3298a2dafd8cde0fa2bada8e39f04e23562f7e4b6c12763c5df

        SHA512

        4781998709364871d468cac318eea6d721051c01d028a1e650fc8b643121dde0ce4e33e0c31c2703828d3c5c5f7cac3d4d262815377d4c745fcba7dbec50beb6

      • C:\Windows\SysWOW64\internet.exe

        Filesize

        205KB

        MD5

        874727a18bc31a0e87b6624f1eae1c71

        SHA1

        ad617ab43fba11a7d716b8f548f85a26e1e4e47e

        SHA256

        61302fc6b0f2c26103ffca2c07717ff535701da905be5998ebfa8312ab63db0d

        SHA512

        da969db0d3a7a96b94a3d616fa14bb674b651cfca29510a338ac30c110e4ed7311a8ac7bc2c95dfa38a93a485985000762c973172a54862128c4464f7e228963

      • memory/1260-289-0x0000000003D90000-0x0000000003D91000-memory.dmp

        Filesize

        4KB

      • memory/1716-285-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/1716-284-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/1716-283-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/1716-288-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/2200-43-0x0000000002B90000-0x0000000002B91000-memory.dmp

        Filesize

        4KB

      • memory/2200-222-0x0000000002C30000-0x0000000002C31000-memory.dmp

        Filesize

        4KB

      • memory/2200-35-0x0000000002B10000-0x0000000002B11000-memory.dmp

        Filesize

        4KB

      • memory/2200-52-0x0000000002C00000-0x0000000002C01000-memory.dmp

        Filesize

        4KB

      • memory/2200-51-0x0000000002C10000-0x0000000002C11000-memory.dmp

        Filesize

        4KB

      • memory/2200-50-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

        Filesize

        4KB

      • memory/2200-49-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

        Filesize

        4KB

      • memory/2200-17-0x0000000002390000-0x0000000002391000-memory.dmp

        Filesize

        4KB

      • memory/2200-48-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

        Filesize

        4KB

      • memory/2200-47-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

        Filesize

        4KB

      • memory/2200-46-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

        Filesize

        4KB

      • memory/2200-45-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

        Filesize

        4KB

      • memory/2200-44-0x0000000002B80000-0x0000000002B81000-memory.dmp

        Filesize

        4KB

      • memory/2200-0-0x0000000000400000-0x00000000005DD000-memory.dmp

        Filesize

        1.9MB

      • memory/2200-42-0x0000000002B60000-0x0000000002B61000-memory.dmp

        Filesize

        4KB

      • memory/2200-41-0x0000000002B70000-0x0000000002B71000-memory.dmp

        Filesize

        4KB

      • memory/2200-40-0x0000000002B40000-0x0000000002B41000-memory.dmp

        Filesize

        4KB

      • memory/2200-39-0x0000000002B50000-0x0000000002B51000-memory.dmp

        Filesize

        4KB

      • memory/2200-38-0x0000000002B20000-0x0000000002B21000-memory.dmp

        Filesize

        4KB

      • memory/2200-37-0x0000000002B30000-0x0000000002B31000-memory.dmp

        Filesize

        4KB

      • memory/2200-36-0x0000000002B00000-0x0000000002B01000-memory.dmp

        Filesize

        4KB

      • memory/2200-34-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

        Filesize

        4KB

      • memory/2200-33-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

        Filesize

        4KB

      • memory/2200-32-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

        Filesize

        4KB

      • memory/2200-31-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

        Filesize

        4KB

      • memory/2200-30-0x00000000023E0000-0x00000000023E1000-memory.dmp

        Filesize

        4KB

      • memory/2200-29-0x0000000002430000-0x0000000002431000-memory.dmp

        Filesize

        4KB

      • memory/2200-28-0x0000000002370000-0x0000000002371000-memory.dmp

        Filesize

        4KB

      • memory/2200-27-0x00000000023C0000-0x00000000023C1000-memory.dmp

        Filesize

        4KB

      • memory/2200-26-0x00000000023D0000-0x00000000023D1000-memory.dmp

        Filesize

        4KB

      • memory/2200-25-0x0000000002350000-0x0000000002351000-memory.dmp

        Filesize

        4KB

      • memory/2200-24-0x0000000002360000-0x0000000002361000-memory.dmp

        Filesize

        4KB

      • memory/2200-23-0x00000000023A0000-0x00000000023A1000-memory.dmp

        Filesize

        4KB

      • memory/2200-22-0x00000000023B0000-0x00000000023B1000-memory.dmp

        Filesize

        4KB

      • memory/2200-21-0x0000000001F60000-0x0000000001F61000-memory.dmp

        Filesize

        4KB

      • memory/2200-20-0x0000000001F10000-0x0000000001F11000-memory.dmp

        Filesize

        4KB

      • memory/2200-19-0x0000000001F00000-0x0000000001F01000-memory.dmp

        Filesize

        4KB

      • memory/2200-18-0x0000000001F50000-0x0000000001F51000-memory.dmp

        Filesize

        4KB

      • memory/2200-10-0x0000000000290000-0x0000000000291000-memory.dmp

        Filesize

        4KB

      • memory/2200-12-0x0000000001F40000-0x0000000001F44000-memory.dmp

        Filesize

        16KB

      • memory/2200-13-0x0000000001F20000-0x0000000001F25000-memory.dmp

        Filesize

        20KB

      • memory/2200-11-0x00000000003F0000-0x00000000003F1000-memory.dmp

        Filesize

        4KB

      • memory/2200-9-0x0000000000330000-0x0000000000331000-memory.dmp

        Filesize

        4KB

      • memory/2200-2-0x00000000003D0000-0x00000000003D1000-memory.dmp

        Filesize

        4KB

      • memory/2200-223-0x0000000002C20000-0x0000000002C21000-memory.dmp

        Filesize

        4KB

      • memory/2200-16-0x0000000002380000-0x0000000002381000-memory.dmp

        Filesize

        4KB

      • memory/2200-231-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2200-233-0x0000000002DD0000-0x0000000002E13000-memory.dmp

        Filesize

        268KB

      • memory/2200-238-0x0000000003020000-0x0000000003021000-memory.dmp

        Filesize

        4KB

      • memory/2200-240-0x0000000003000000-0x0000000003001000-memory.dmp

        Filesize

        4KB

      • memory/2200-239-0x0000000003010000-0x0000000003011000-memory.dmp

        Filesize

        4KB

      • memory/2200-237-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

        Filesize

        4KB

      • memory/2200-236-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

        Filesize

        4KB

      • memory/2200-235-0x0000000002FE0000-0x0000000002FE3000-memory.dmp

        Filesize

        12KB

      • memory/2200-234-0x0000000000400000-0x00000000005DD000-memory.dmp

        Filesize

        1.9MB

      • memory/2200-243-0x0000000002F90000-0x0000000002F91000-memory.dmp

        Filesize

        4KB

      • memory/2200-242-0x00000000002D0000-0x0000000000313000-memory.dmp

        Filesize

        268KB

      • memory/2200-312-0x00000000002D0000-0x0000000000313000-memory.dmp

        Filesize

        268KB

      • memory/2200-249-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/2200-311-0x0000000000400000-0x00000000005DD000-memory.dmp

        Filesize

        1.9MB

      • memory/2200-261-0x0000000002EC0000-0x0000000002F04000-memory.dmp

        Filesize

        272KB

      • memory/2200-260-0x0000000002EC0000-0x0000000002F04000-memory.dmp

        Filesize

        272KB

      • memory/2200-302-0x0000000002EC0000-0x0000000002F04000-memory.dmp

        Filesize

        272KB

      • memory/2200-264-0x0000000002DD0000-0x0000000002E13000-memory.dmp

        Filesize

        268KB

      • memory/2200-263-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2200-3-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/2200-301-0x0000000002EC0000-0x0000000002F04000-memory.dmp

        Filesize

        272KB

      • memory/2200-4-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2200-5-0x0000000000320000-0x0000000000321000-memory.dmp

        Filesize

        4KB

      • memory/2200-6-0x00000000002B0000-0x00000000002B1000-memory.dmp

        Filesize

        4KB

      • memory/2200-7-0x00000000002A0000-0x00000000002A1000-memory.dmp

        Filesize

        4KB

      • memory/2200-8-0x0000000000260000-0x0000000000261000-memory.dmp

        Filesize

        4KB

      • memory/2200-1-0x00000000002D0000-0x0000000000313000-memory.dmp

        Filesize

        268KB

      • memory/2200-287-0x0000000002F80000-0x0000000002F81000-memory.dmp

        Filesize

        4KB

      • memory/2200-282-0x0000000002F30000-0x0000000002F31000-memory.dmp

        Filesize

        4KB

      • memory/2200-281-0x0000000002F40000-0x0000000002F41000-memory.dmp

        Filesize

        4KB

      • memory/2200-280-0x0000000002F50000-0x0000000002F51000-memory.dmp

        Filesize

        4KB

      • memory/2200-290-0x0000000002F60000-0x0000000002F61000-memory.dmp

        Filesize

        4KB

      • memory/2200-293-0x0000000002FE0000-0x0000000002FE3000-memory.dmp

        Filesize

        12KB

      • memory/2200-292-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

        Filesize

        4KB

      • memory/2200-291-0x0000000002F20000-0x0000000002F21000-memory.dmp

        Filesize

        4KB

      • memory/2200-294-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

        Filesize

        4KB

      • memory/2200-296-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

        Filesize

        4KB

      • memory/2200-295-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

        Filesize

        4KB

      • memory/2200-297-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

        Filesize

        4KB

      • memory/2200-298-0x0000000002F90000-0x0000000002F91000-memory.dmp

        Filesize

        4KB

      • memory/2200-300-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/2200-299-0x0000000000400000-0x00000000005DD000-memory.dmp

        Filesize

        1.9MB

      • memory/2244-246-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2252-272-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/2252-265-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/2940-253-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB