Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 02:44

General

  • Target

    4c7a9999d335dd8a68d78122dec64346_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    4c7a9999d335dd8a68d78122dec64346

  • SHA1

    d29829dae8f4495328629c1141a4ca75b9493c80

  • SHA256

    73d7a93dcde744159168692552534a5ee8be52d4edcef69a6d2805e2ae2ce01c

  • SHA512

    a91beece0959eed46914ad5d5b2d78eebda3fe32dec50b3db9500a7b057293685785d59ab7b50ce114aac1f471f4f3adbe3c96cf8babf01e699759f7b0bc09e0

  • SSDEEP

    49152:corzJdf0uJekfakGWiLN8GnZ84HwB+CKQc+2K1iWF0XnuuH:covJdf00fakPiXnS4HCKQc+2K1iWFD6

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c7a9999d335dd8a68d78122dec64346_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c7a9999d335dd8a68d78122dec64346_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\inwebsam.exe
      "C:\Windows\system32\inwebsam.exe" /install /silent
      2⤵
      • Sets service image path in registry
      • Executes dropped EXE
      PID:1272
  • C:\Windows\SysWOW64\inwebsam.exe
    C:\Windows\SysWOW64\inwebsam.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\eamcf.exe
      "C:\Windows\system32\eamcf.exe"
      2⤵
      • Executes dropped EXE
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\inwebsam.exe

    Filesize

    1.6MB

    MD5

    e47e7d058f7f043fc5dd50c85c7223a7

    SHA1

    631b02e5fa5c977325951ea0341e3ada2414a114

    SHA256

    4083741d513fa98451210a7c30888a0916c1cfc411498fbf6059d0a47ea32f35

    SHA512

    2a4af5c0ef9f0275cdffcb86ef172bc6eae0fefaa11d8c9553011a22182b667b9be29ba9aed6e6ad728d810930782902af0b0af0c1ba786c8a790ff78d70b826

  • \Windows\SysWOW64\eamcf.exe

    Filesize

    159KB

    MD5

    fb704d801095747d27c053b76ca86c92

    SHA1

    74d17abe02aaf603558fe63ffa505032ea3445d3

    SHA256

    9dd7a1819e30969b8a5d89b934eba2f6decc8cb29b8d57c96fee7f8e264e60d8

    SHA512

    f9abf68da6417f01e9c50fe5b76690de578387917d53063bc293a45051df56f2b86111df37bd7c0e59c0e88acf0abcdd0ef59eb3118ec6307eed5e9ea80c2cb5

  • \Windows\SysWOW64\ldmevsh.dll

    Filesize

    342KB

    MD5

    73d9e3b9962751f7e9e93a689200a027

    SHA1

    24e84f234f4f7f6334d7bc7ab95b172f52b036f3

    SHA256

    c74372c1586051b9ea173e7eefd2b85a0e5e0402e84e50b4cfb8438c5d98dc67

    SHA512

    dcd2d79f226522088f6bff1b24d2cbbab7089b6f7de4f4f96152ef79b58f70eeec7d09195928ddebe1d03202f62f7659d88403b47a27316de2eeb8e093f4ca66

  • \Windows\SysWOW64\libeay32.dll

    Filesize

    454KB

    MD5

    0760bbb92fedca6dc101796e7e77f133

    SHA1

    f23e8fbde23f47fd3ab31f0aed2e31d7f1c74524

    SHA256

    56a3f32f8ba526ff214636f0ffc109954b1f1b56579ef763621f744c80af2ff0

    SHA512

    5ef4f3e7511c3f298a09fb6b05ce484db06dfce725b674a44fbdf8aa22510ff4a528414f7cb015e8a5d7a91f29af797f4eb23d8487df779862616cc3a8af6bf6

  • \Windows\SysWOW64\ssleay32.dll

    Filesize

    90KB

    MD5

    7b09cc3c996609f6f5a9fbe75611b91f

    SHA1

    7ee63bc5fcec06b356811b9a5c494fd7da1b376d

    SHA256

    ae75de3ec03d2d1e038bdcb41af4d5b415b485f4e712003e5d0faa1375d80890

    SHA512

    bb85532463dd63b2384f6d23bd6c4b794433178bd9a595579e52b4358f9059328d81925bf924164c93d710064d542ce58662892b6f0a458e97f3479ff425bbea

  • memory/1272-20-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1272-21-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/1984-25-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/1984-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1984-0-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2348-52-0x0000000003240000-0x0000000003345000-memory.dmp

    Filesize

    1.0MB

  • memory/2348-66-0x0000000003240000-0x0000000003345000-memory.dmp

    Filesize

    1.0MB

  • memory/2348-36-0x0000000003240000-0x00000000032AF000-memory.dmp

    Filesize

    444KB

  • memory/2348-44-0x0000000003240000-0x00000000032AF000-memory.dmp

    Filesize

    444KB

  • memory/2348-68-0x0000000003B20000-0x0000000003B59000-memory.dmp

    Filesize

    228KB

  • memory/2348-53-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/2348-23-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2348-59-0x0000000003B20000-0x0000000003B59000-memory.dmp

    Filesize

    228KB

  • memory/2348-37-0x0000000003240000-0x00000000032AF000-memory.dmp

    Filesize

    444KB

  • memory/2348-57-0x0000000010000000-0x000000001011E000-memory.dmp

    Filesize

    1.1MB

  • memory/2348-67-0x0000000010000000-0x000000001011E000-memory.dmp

    Filesize

    1.1MB

  • memory/2348-64-0x0000000003240000-0x00000000032AF000-memory.dmp

    Filesize

    444KB

  • memory/2348-65-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2912-49-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2912-63-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2912-48-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB