Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 22:47

General

  • Target

    43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe

  • Size

    5.6MB

  • MD5

    43a7a2655320401aaad30483edba35d2

  • SHA1

    45e8c8428885ae50835da8cd4d8050ad54cafd66

  • SHA256

    d3bd0a1c368d2becee9b7c3586c6c81f9318e4f985368f254a016a43a35c0a0b

  • SHA512

    145dd10ae2a24969b273362da91c42876b40043083d142a48faae8df6d8e5a0d55adc3efb5a8d388dc923594a0a7a4980a694f125036e3b6e508be0a4ec86df8

  • SSDEEP

    98304:+BexMKy9uEEytMBR7Vao60gT9PyrqHBcPViPCTlPnOMjTTW4wtQnbYTNPNeB35Em:+BHEWSR7Yo6DZauhonCQnbYTyX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 26 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
        "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        PID:2228
  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe
    C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe
      "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini

    Filesize

    27KB

    MD5

    62d5f9827d867eb3e4ab9e6b338348a1

    SHA1

    828e72f9c845b1c0865badaef40d63fb36447293

    SHA256

    5214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5

    SHA512

    b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732

  • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\IKernel.ex_

    Filesize

    336KB

    MD5

    4d63bbff28afc7a69b6defaf048306a7

    SHA1

    8e8a6fb997051e7e4bc9b32be517f40e4c8ecd9b

    SHA256

    4eb9a6a4c0b1147290c74d2160533e49e043335255be9a60b6c83638d83e5590

    SHA512

    251e3782bd481564a52729386df31f338a9ae1d80123e222684c9e753dd0c8c3106e98d9fa5d2874ff6345182f1909ae1b7864716d5632d42ca91bf94422ff65

  • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\data1.cab

    Filesize

    600KB

    MD5

    7d3e7cf4f3bba53b37c84698bfc118e1

    SHA1

    fc9e6493f4ef7268b85cf345fa4df3b7a18a25a1

    SHA256

    19133b2306544cbabf0b42b0ee1f5889ddfd482973ae8bdd1e3a04e4f62d7fdc

    SHA512

    d5c74b5fed48da280180ab0800a8797498e4bc35ffa1d3eaef347734657bc98bf7b66ae16be0d55b5d03e369f1e0c3915a6c0aa924edc864db8ba18cb2c8b6e1

  • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\layout.bin

    Filesize

    417B

    MD5

    098355ad34f9618d62b45f0e6df3bb15

    SHA1

    8746a1a0d1f65cb4ed767e93d17f102e69d24a44

    SHA256

    76c9b79f9243b312a9017aa087615a667eb4c7e530630877015fa0d3505800ac

    SHA512

    2ed4b1255a13c346fe0ca393172d84e0c2a3691b45fdfe85c8e16abaf4ae84af541bd23ade60cac28cc5e69c6a5f2081dffa2b25e328150ccdf02e3a2e33ea59

  • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\setup.ini

    Filesize

    171B

    MD5

    27f9eeea8b4a64c76ba3adfef515c6ab

    SHA1

    c28df725056e5215a2b958205402227dc5ff01dd

    SHA256

    262f122acec43ada6bbf3d7b9e1df68e8ca468f3420f4c0d5967631eba1f78ed

    SHA512

    5d7dbca1cc14cf6c533f4788e89e4abfa406a366c9449122b8fd071b0d818e9ee9dd47d5d18fad978c7cfede8303eefa46a2ca4c36a2f46a525af44a664245e0

  • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\setup.inx

    Filesize

    128KB

    MD5

    79bb60f5943eb3107a75ff87b0eb0e05

    SHA1

    fc56a0e68e14e3f407b49a3adb6930dce2940fde

    SHA256

    1256c566cca0f5ff4d91f169d3b8faa4eaedfc1bfed67775894b317ceee88f52

    SHA512

    426d439117a17df7512804cff14bbe3aea1d54bdac5e75bf2864a47dbd880ad2d0ea091fa059b9330c6d229dbc4a94b7daaa12e07f42f78493edd589d9ceb2f6

  • C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\pftw1.pkg

    Filesize

    5.4MB

    MD5

    2cec4675385f1ce32a2d2d97d8ade455

    SHA1

    051f09cba543ae42607bdfed0496de2362a5c38b

    SHA256

    80433bee5231e5646bec1d2904db1fd5bafd5068d060d2b63cc2d0fe89a9bd7c

    SHA512

    ad8ee28ad73bdc0535bd2a9a968b09ed3ef8a3d2a8dce18067c17bea658f6c4885de17691c0be26a89e80e7518bac3bdd3735ae9a36869627de38cfaa57ef9a7

  • C:\Users\Admin\AppData\Local\Temp\plf4403.tmp

    Filesize

    4KB

    MD5

    19a2283172165182d05bbd5745372f62

    SHA1

    4cd50813878acf10fd5164c814d0692280c773e1

    SHA256

    379addfc2e4a0309ec0526507d564fc79eeb6635963c0e84f10cb8b103036c54

    SHA512

    b14f8f6efcc6d3395ab41c5eab22a2c1201f760627f40929e8575aa9c16092ace0370f4248e9b6a7ef2cf74ae53d4e9e5f8cb42253fe0a5b2c61a4bce72abeb5

  • \??\c:\users\admin\appdata\local\temp\pft4433~tmp\disk1\data1.hdr

    Filesize

    17KB

    MD5

    d660d3890fbf751e2fe4234e27f085bd

    SHA1

    7458138624e3009b4402dbe8163fc345c99fe97a

    SHA256

    8a8a3b2f2a88846b9e75040ac965a4379d019e57e6bcff2f3f344b595a342d4e

    SHA512

    6269bfe9128b93306d2042094bca6716dec218645b5a4c70f9e3d7af40b8fdb375cb1a8d0f97b195112d2bd5b68b112f3f49a21370feeddde762fd365afb8392

  • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe

    Filesize

    596KB

    MD5

    bf25eb6a1e0aa2fff0cb190270b95418

    SHA1

    79cad1291ac8b042af8454328ef7c71ce04a7c9d

    SHA256

    4535320c5b9596a6210109f68c647dbdbd0289ba63286fd389dea910855491f1

    SHA512

    66a4ee419548e63c0a007be91ad58d5e1a6cf37e5df70a5da7ddcc0a1f4831bb42ba67c6cc8ce3d54b99fa77a9249ace9b5cc4836e957103b9901484bb04337b

  • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctor.dll

    Filesize

    76KB

    MD5

    003a6c011aac993bcde8c860988ce49b

    SHA1

    6d39d650dfa5ded45c4e0cb17b986893061104a7

    SHA256

    590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a

    SHA512

    032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7

  • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuser.dll

    Filesize

    172KB

    MD5

    377765fd4de3912c0f814ee9f182feda

    SHA1

    a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1

    SHA256

    8efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb

    SHA512

    31befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710

  • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objectps.dll

    Filesize

    32KB

    MD5

    8f02b204853939f8aefe6b07b283be9a

    SHA1

    c161b9374e67d5fa3066ea03fc861cc0023eb3cc

    SHA256

    32c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998

    SHA512

    8df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59

  • \Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll

    Filesize

    220KB

    MD5

    b2f7e6dc7e4aae3147fbfc74a2ddb365

    SHA1

    716301112706e93f85977d79f0e8f18f17fb32a7

    SHA256

    4f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1

    SHA512

    e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83

  • \Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\Setup.exe

    Filesize

    163KB

    MD5

    6911bc3432dfaf16063f6c2af5eb4b52

    SHA1

    94e77684fe200b189061207b5fd042bb22d2f37d

    SHA256

    ad22c57908918f70864634b2580cb57237dbd1031f6f7a662f7644cfe0b57528

    SHA512

    6702cba5a3d05637017a76812970e32701d3a96b84e95819b633426495eb98ccfc1254753d49525a3e20ebddd2ae23b1df495139ffc6aeb697e772efdd045f3a

  • \Users\Admin\AppData\Local\Temp\{122FAEB0-9905-4BC1-B202-51D496DDC2A7}\_IsRes.dll

    Filesize

    212KB

    MD5

    37554142e54a38de6d2142ba80353f0f

    SHA1

    6fb0102aa862674169cb7f506ee185ad5299ff19

    SHA256

    0888d2a696ca222ebc35641502548e5b79b55c9f7c094466a1a52d9d4d429a64

    SHA512

    1b3c16d792993569999e0e8271daa4165e29400942e21bcd73423c8d517144aa487d906ef593c7bc67c5877ba3fc098f25386170ddebedf8156f87adc947b181

  • \Users\Admin\AppData\Local\Temp\{122FAEB0-9905-4BC1-B202-51D496DDC2A7}\isrt.dll

    Filesize

    316KB

    MD5

    13b70633df1bf63e19fe4a74a53b8896

    SHA1

    f542f67cc15002f76f3ab9230297ccca2461c009

    SHA256

    7f852b5ee852ae2870d63db4d9cac454e08e93104d18bf5c9efc068d85c35147

    SHA512

    5fe27c41fb5de0ae2373295d0f5b13be7d863161e94d29bbeddb84acab4300a9bc93482c80f874ccaa9fa20b2066d7824c530ac3f4575bb999da3f594ccd4a2b

  • memory/2668-148-0x00000000004F0000-0x0000000000503000-memory.dmp

    Filesize

    76KB

  • memory/2668-151-0x0000000003370000-0x00000000033A8000-memory.dmp

    Filesize

    224KB

  • memory/2668-156-0x00000000033B0000-0x0000000003402000-memory.dmp

    Filesize

    328KB

  • memory/2668-160-0x0000000001EF0000-0x0000000001F1C000-memory.dmp

    Filesize

    176KB