Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 09:38

General

  • Target

    45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe

  • Size

    18KB

  • MD5

    45447659f2729d59f8ccf8754c5a1f6c

  • SHA1

    2bfe87fc470ffbef7c3496a6dad75e1a735b2ffe

  • SHA256

    ebf480a412696b0518b3c4aa1cc8b7a0133cf688421fbcd70ec57bf76b6b9432

  • SHA512

    de2f5f29b58f316be83a99cb06dfdbe05b81e7f61207122de490ace1b3e2dd83be1e4be0eef73988e09d84072ac38262763e914556e5f7971645477c01b99244

  • SSDEEP

    384:+3v8xikYTJkk22+RsgW6HcbWLoJjUpMHToRUTYOtUAblcrDY:+kvr12eFpHcbLxUpM+ByKrDY

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Program Files (x86)\Internet Security\isamonitor.exe
      "C:\Program Files (x86)\Internet Security\isamonitor.exe"
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Program Files (x86)\Internet Security\isamini.exe
        "C:\Program Files (x86)\Internet Security\isamini.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3948
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\454476~1.EXE > nul
      2⤵
        PID:1916

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Internet Security\isaddon.dll

            Filesize

            14KB

            MD5

            97fef948eb337717c83af924e699cf69

            SHA1

            6f4eadd23e9212eab8b2b1920c8c3a0288f41c45

            SHA256

            d7b1576fa03f650eca3b53c713e6a396b2b477e938b2bedf258a42123cd6c0ca

            SHA512

            4ab79aad17a21fcfaf28b44395b79986f229d73eda813b4e1100e7044eb83f65459dcd56a62f4d921505c08e6ef68d3a982ad03d68b81be63b114ca85ae4f24d

          • C:\Program Files (x86)\Internet Security\isamini.exe

            Filesize

            6KB

            MD5

            944f7d04bda8aaa7ce79b4287d3fd395

            SHA1

            c65126d87de1a78a75757bfbc4a50e8234bb1b93

            SHA256

            c01400b3302c0a9c4cdd6f5cc6450523809ab5d5738709a0d46fbab786a898ba

            SHA512

            08ff2cb4700146d9bd2a1333de7e70281196b731a8706e8d818880572fa7f60f28fe06d12e56194f8495029b4cd22e754a32dcfef2071b43491dea872f6e8674

          • C:\Program Files (x86)\Internet Security\isamonitor.exe

            Filesize

            34KB

            MD5

            bb03ea39a32fafcff4c8b6b86b1d1e80

            SHA1

            f43c3d99da70040faa205f139ee9ab709e9b324f

            SHA256

            8c9a2d107eb6b3cb5635a2785d1d124878fe9a0fdccf81f28125a859c7ef2e16

            SHA512

            771acd56ff6e239a95710eb508441fb6924439fa191de24faea0d921081f8d2977a8d4101c3a280843a7338d756dd991dc59b23ef9a3d442e030f88b7b5cf512