Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 03:29

General

  • Target

    5a4ac31453f9c83c82ae5d7ed1e2d6b2_JaffaCakes118.exe

  • Size

    468KB

  • MD5

    5a4ac31453f9c83c82ae5d7ed1e2d6b2

  • SHA1

    26fc48d4adf0761894aa8d7d4fb59c84a62e3133

  • SHA256

    2d46fe98c5a3e8351983c895b8a9ce15364a9ed872cd11cef0fc839ab1914763

  • SHA512

    474be6c2644061fe41794598b9719d024178b9a094fb29c016a1f907ccec800950d9b4379b776f070e9b3c521d615f79fc64fc440a7f3b8cca42a6955ff3dd12

  • SSDEEP

    12288:B/3KBaDVuotwC559JYz4aysshaGpPpFOEh1Xpr3IXGTTJEdI:B/3EaDVrwC55gfxsZP+EhFt3IXJi

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a4ac31453f9c83c82ae5d7ed1e2d6b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a4ac31453f9c83c82ae5d7ed1e2d6b2_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"
      2⤵
        PID:3016
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"
        2⤵
          PID:2924
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"
          2⤵
            PID:4544
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"
            2⤵
              PID:4284
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"
              2⤵
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:3156
            • C:\Windows\SysWOW64\b55d.exe
              C:\Windows\system32\b55d.exe -i
              2⤵
              • Executes dropped EXE
              PID:2592
            • C:\Windows\SysWOW64\b55d.exe
              C:\Windows\system32\b55d.exe -s
              2⤵
              • Executes dropped EXE
              PID:2028
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:4120
          • C:\Windows\SysWOW64\b55d.exe
            C:\Windows\SysWOW64\b55d.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2108
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always
              2⤵
              • Loads dropped DLL
              PID:3868

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

            Filesize

            380KB

            MD5

            c0059f061ad4428521f33fb1b6c2936d

            SHA1

            d5724cf96c42b0046ddd5631708d4c2cec291ad2

            SHA256

            b9cd0da20c22755083f2d8f9eb99ea521550ee33ccaab3e051b9bd772732ffb5

            SHA512

            7f2efb5d2824bbf96d8dabde86b78556edaba4767fde2bbba1584952cf19db2c565ea2ae645b774568946fd1dc37fe1c2a6cddfe49722e0c837398f7d32d4959

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe

            Filesize

            108KB

            MD5

            3caba4cf956b902928b74c6810e3f386

            SHA1

            c5b89ae2eb2e6c94503a3bb4f80881dfde7b724c

            SHA256

            f6f79e8c7268a012e3dbdf6db3e175ba32c1120bebb11607bdcd25fdf61db9a6

            SHA512

            ef5a884d8f64439bb4d80cb7d96ed1669d5bda45d60cc5ddf2686528e938a5e3e9efa69abca5857e3c23cdcac1d25a63ecc10bef08a6088b674d77bc0776c126

          • C:\Windows\SysWOW64\4b3o.dll

            Filesize

            136KB

            MD5

            cc792f2bc1c0e8ac870ab35317b3aaa7

            SHA1

            3409e17db6251f4bb34d25b60c8e499f994ca0fb

            SHA256

            6881df31f804621abc322095950ae48abd0240d5d9c86f6f691b9d4320d91cb9

            SHA512

            89863f8cac47450c0bf2f3583f700c1461d084f0d694e056d1e3b975921d196b39b93124b7bb443d99bbaa6af3d449d3b1e8fa0e80f126be1324e317bd5b47ca