Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 10:35

General

  • Target

    4def4ddba40e11df24d6f10447676eae_JaffaCakes118.exe

  • Size

    520KB

  • MD5

    4def4ddba40e11df24d6f10447676eae

  • SHA1

    dfeca41d7e103f6f8175dd7a256b39747d8cce23

  • SHA256

    3ab114207384aff54a61e522aae0f0af5d14a34421f881a8c450472693d17a49

  • SHA512

    0d43ce0f730ada9eed3badf123ea8b678ef9a77b60204eacb6b0849c9f534484e99634444cd0c1cf220cc3b24c744fef1b12f07f02d06912e78aff2ed60cb778

  • SSDEEP

    12288:IO0crBSWN3aFAmeGytrgv2reFrq3yZzITU6ztZs:IOzAY35msg+reEm2bt

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4def4ddba40e11df24d6f10447676eae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4def4ddba40e11df24d6f10447676eae_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Windows\SysWOW64\rundll2000.exe
      "C:\Windows\system32\rundll2000.exe" "C:\Windows\system32\wbem\sviin.dll",Export @install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1872
    • C:\Windows\SysWOW64\rundll2000.exe
      "C:\Windows\system32\rundll2000.exe" "C:\Windows\system32\wbem\sviin.dll",Export @start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2076
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\anorl.dll",ExportFunc 1001
      2⤵
      • Server Software Component: Terminal Services DLL
      • Loads dropped DLL
      PID:3824
    • C:\Windows\bar.exe
      "C:\Windows\bar.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:3912
  • C:\WINDOWS\SysWOW64\RUNDLL2000.EXE
    C:\WINDOWS\SysWOW64\RUNDLL2000.EXE C:\WINDOWS\SYSTEM32\WBEM\SVIIN.DLL,Export 1087
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\superutilbar\superutilbar.dll

    Filesize

    225KB

    MD5

    70bd8878156db1490145bdebe88e349a

    SHA1

    51533c4d229f4667fd36616cc29dc3549a7a14c9

    SHA256

    37531889177a599fe9546d12a93209039e051c92adc5e22fabbfb792010a0f14

    SHA512

    44eae7748715f7c047a05ae2962900cf74aebbc0ce5b78a8db9d1c7a82412bd842011372f9f58d8c02751160a331a1643a4e026e81c12778efe0a72cae735340

  • C:\WINDOWS\SysWOW64\WBEM\ocmor.dll

    Filesize

    6KB

    MD5

    2c9c3948edbbdb7015054eda23d1cca0

    SHA1

    14a6aa1d75dfdfc2fd213545f150c034b0f7286f

    SHA256

    b75790e97df65e074970d9347148d60860328b91c6e0be08deacdc204b076fea

    SHA512

    75c70cb432107b43e20f6df8dc9484deb60d0a4dd2bf7182686a56bc533aaf44862015f40a62d867224502a5a505611b4d90b5638cf86721fcca378098fa9e9b

  • C:\Windows\SysWOW64\anorl.dll

    Filesize

    236KB

    MD5

    c4eb7f80a7861092d38f49d22f3ec6e8

    SHA1

    f63e3fe1c7dcf41787e75f44720e45d5c74c93ef

    SHA256

    a84821340f3229c4a940199160f47cc076b8664c5ac220c078bb353295edbdf4

    SHA512

    e75615fd63e79c922c746272bd7e8ee55ab2bf879be46535de57977b6319d964d8fe096ee844a9bd1f84958d3d24fc1842aaaea44ec845339c99295e69b8ac29

  • C:\Windows\SysWOW64\rundll2000.exe

    Filesize

    10KB

    MD5

    4936a6954ed59700a3c706f9094685ee

    SHA1

    124edd171bfc8a5c7f5fcf2147f6ff43b705bb79

    SHA256

    e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe

    SHA512

    1ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea

  • C:\Windows\SysWOW64\wbem\sviin.dll

    Filesize

    236KB

    MD5

    84cebf4537b592af9bd4a54e7488cafc

    SHA1

    d9d445b3d7bcf2b02881a5b7d23643bde3bd451a

    SHA256

    51f48d3615f285efd7fc00395d312497fda20a3a325a088141ad97b176b4497d

    SHA512

    0d048966d997fe7892260341021ceb3975eb06897f77e28cbb7cc853851fd97a08a2f57639c569f731f280310f284017e48895cec657976d7ab43e582d65b33b

  • C:\Windows\bar.exe

    Filesize

    272KB

    MD5

    3c103af2fc889d3dae65e1cd335e1144

    SHA1

    9b36cecf2d2731e617cb621c3e4dbd977d7fc209

    SHA256

    9ce2504516ebd4653b9139d3828b93ace39d3530f1f22c4b166d04f11c2903af

    SHA512

    763e49e23e8b43ac6d6ec68e83f9a72ad144b446b1f60c3d7fd80aeac9d3340bb80815b7feb38b3076fd2a525176fe56602377891837f9e0b932cb8bf83c33d9

  • memory/1872-14-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/1872-12-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2076-24-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2076-17-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3428-29-0x0000000000400000-0x0000000000482200-memory.dmp

    Filesize

    520KB

  • memory/3428-40-0x0000000000400000-0x0000000000482200-memory.dmp

    Filesize

    520KB

  • memory/3912-46-0x0000000010000000-0x00000000100C5000-memory.dmp

    Filesize

    788KB