Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 14:23

General

  • Target

    420da92844bbd2739f0d9148906899d8_JaffaCakes118.exe

  • Size

    865KB

  • MD5

    420da92844bbd2739f0d9148906899d8

  • SHA1

    17b6c07722b5ec97622229fd83b6f54b71b50ebd

  • SHA256

    97c3eaf231080b3cc8235380363fa67d2b87403812c1c42b17a9f6cfa79514ed

  • SHA512

    eeb1dd35c456dc0a627e9f20bcb8dfe639e9c8a236158b1ec9524e86dc4f09a53697cc266c12332eeb5d48bef78a7a29c5e6add9713f3434fcc4d85bf5c465c9

  • SSDEEP

    24576:7xU6g5A3QC6gG/GeeUH1ewJHLRwKtq4FY1jrsQnY:9U6g5tClNUV3HFht7FJQnY

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\420da92844bbd2739f0d9148906899d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\420da92844bbd2739f0d9148906899d8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Users\Admin\AppData\Roaming\RapidGet\RapidGet.exe
      "C:\Users\Admin\AppData\Roaming\RapidGet\RapidGet.exe" /r
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:2528
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\RapidGet\RPDMgr.dll"
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2540
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\rpgd.bat" "
      2⤵
      • Deletes itself
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rpgd.bat

    Filesize

    266B

    MD5

    f54cfece7bfb9a5e1ca5266816a00e2a

    SHA1

    6d097abf9d5c4e431c82981d09de951dc366c639

    SHA256

    bfd44c57b547a6df9624f7783e041092a6e15dd122a7f02fcc7127cac3a2476e

    SHA512

    eec9b85aef9a1d3cc5bfadbb587c429ea859793539254d190d6b616aa444dcff2b73af1bcc029dcead337c008206c0d76e0f6a471f7d236ad1e16b211707be37

  • C:\Users\Admin\AppData\Roaming\RapidGet\RPDMgr.dll

    Filesize

    111KB

    MD5

    ae6a5c99bb0986e24908d6fad5889821

    SHA1

    fc2618ad6a99364ce15cd48eab8c29a4bea9d9f1

    SHA256

    67e6ea67ba3e5c7b523947365ad69aeaef06dc1a43dadf43ee5d372c0746542e

    SHA512

    ae05458a77d6f7a718cb876b7d3146bb72a51611bf87d8e147cf3424f435d0c06009c8762c9a4eb3587b79c82c415e3574388caf5fec265c61fccac983b4c0a0

  • C:\Users\Admin\AppData\Roaming\RapidGet\RapidGet.tlb

    Filesize

    2KB

    MD5

    5ef736e80b473232db05a79093238269

    SHA1

    7b2218bc78ac54a49903c7917f752df9780e063d

    SHA256

    f308c8c8459b8f037cd67fdf17e5ca9f86ed9a798cffc8030dba63ae26d2edc5

    SHA512

    98a0025bea1f9ee62f9d2ce39b9df49fae91909aabe8548e033f64167d800e8d49de9c8c629c5408d82482a6a9918fc8d207ef99d2e9d7389ce8c14c724bc235

  • \Users\Admin\AppData\Roaming\RapidGet\RapidGet.exe

    Filesize

    727KB

    MD5

    a067a36e31506ccb377016692ad81670

    SHA1

    7c9b445caf21950499d61471fdf01cd0d7521a3f

    SHA256

    21a4fb016fd7fd4959d4dc03ba7240fd2b8466cd50c60b460c2b0303c94ee293

    SHA512

    86a4bce6c58fbbf4372368254e77802ef5d31c43b21c62b77eca2c66188989eff274d717a59bc317501843dc6415d109bf80fc7cde46598381f7faaab40410e7