Analysis

  • max time kernel
    124s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 02:09

General

  • Target

    5ea1f5b67b358a75916b2ed35dc20956_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    5ea1f5b67b358a75916b2ed35dc20956

  • SHA1

    618b8a8ddc934d4859849a48402b708820a49867

  • SHA256

    3ca5f71f842fc089cdf58ec9f2eeb56b0393b86f4876cb4c43f1ac46c166e47e

  • SHA512

    4b41bb213f70878eb267227925c95b998bfc88e9f9f0bacd5e44d98756341a9f2754fe4602fdbee25000ea0517b849523cca4e4b69990a2b5f7777c116645a77

  • SSDEEP

    24576:5IZ8i8M868AcleRzVyoohLYXTPElZ5/BSa3aMaIQmNQ0zprGYUw3sRo482ugdbuw:5IZ8i8M8685eRzzXC5aMamlFvs2482T3

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 28 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ea1f5b67b358a75916b2ed35dc20956_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ea1f5b67b358a75916b2ed35dc20956_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\~compoundinst0\apropos_install.exe
      C:\Users\Admin\AppData\Local\Temp\~compoundinst0\apropos_install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Program Files (x86)\AproposClient\Apropos.exe
        "C:\Program Files (x86)\AproposClient\Apropos.exe" /RegServer
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies registry class
        PID:2960
    • C:\Users\Admin\AppData\Local\Temp\~compoundinst0\auto_update.exe
      C:\Users\Admin\AppData\Local\Temp\~compoundinst0\auto_update.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\AutoUpdate0\auto_update_install.exe
        setup.inf ProductionInstall
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Program Files\AutoUpdate\AutoUpdate.exe
          "C:\Program Files\AutoUpdate\AutoUpdate.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\AproposClient\SETA46A.tmp

    Filesize

    568KB

    MD5

    afa2a9c67e4b9015748dc7dc837686e5

    SHA1

    1180613142ff20df4394795ea5192b602590fcf1

    SHA256

    77aed7adaeb1d011d6df656f5340e7436e29fce02729cc1860d99a3265e7dd12

    SHA512

    92aa2d26137e5d578e9017f6e8258e6acfb37b8ca05c938c91fc310f2a6fa61d66e640fb321965643175149f4206ef058e63bbb3ff6cc030265fba39d30ef9e4

  • C:\Program Files (x86)\AproposClient\SETA47A.tmp

    Filesize

    40KB

    MD5

    36becf95c9eee09bce6718720debae35

    SHA1

    7c4fb7aba8dec523ae615077f9a9ada53ec1953c

    SHA256

    49ee9f5ad6119e1a7fac5e596c501ca192298f94b46a4ea34787dfcc237369bf

    SHA512

    a75788ec08a2c4f08e74a981fc14bcf936d0845ffdde8f1933fd96299cb868fb62be6e56989cec235d5cd502836e8b2cb6e3abf4ebd4da33a5e174e470b37740

  • C:\Program Files (x86)\AproposClient\SETA47B.tmp

    Filesize

    280KB

    MD5

    2beddff13410138b2be8cbd955806cfd

    SHA1

    d0fceb55e21dac82028989190d5e4f3724a5b08c

    SHA256

    9c4ace3f80f47bc940f4ce60d2a1233e52ddff3475d51f8fe3ec734a60b6d856

    SHA512

    fee1a42e53361dfcc35545f59e1767f7f546d676b48e046be7b3865ed192455bf63ced4559e1773d03437f420b097c83e478f0ad937a00e018d8436670198428

  • C:\Program Files (x86)\AproposClient\SETA48D.tmp

    Filesize

    140KB

    MD5

    85c3f3058b8d6d6332b48542957b8419

    SHA1

    e66d612ac7eda9d7915ea342c256b427b2d10c32

    SHA256

    5db5a53399d10b3b78172bc87806ad13937b86d11181bb67ba66088f9563c801

    SHA512

    1f0bf206adb1216eebf99ded20527f79b779589d7542209ae62a941b8364174919c1bcfa3e7e800f840c8d906b000be4025348e747d998bcbd787be1492fb182

  • C:\Program Files (x86)\AproposClient\SETA49E.tmp

    Filesize

    448KB

    MD5

    5faf095bbf43aa4a89e17b6d551429ac

    SHA1

    afe0727df634a5d3619ab8ff4184b721a6bac398

    SHA256

    65bde5d64fa259fac1c3c6c1a1d9b5212d51b9826fb860349609b732fa67f228

    SHA512

    fd91594ac516dd1ba6f4735c8d697c36dccb4b373acfe24f43f378a1fff05ed2acf2c0b9b240244e43cc4c2ef182ed3842c147d047a0dfa5f188b0dc3092399f

  • C:\Program Files (x86)\AproposClient\SETA49F.tmp

    Filesize

    156KB

    MD5

    15ae20f1dcfa56d578450f000ce748b4

    SHA1

    9edaa9e2219a1b411aff956100e136c95cc8b80a

    SHA256

    54e95c3f0aba365c36f509defe1212cdb717798746ac6fb8b726ed6f54a1d4d3

    SHA512

    965c8efb5f26d5db898cb86a915fe983c237de1a7ca1027a33e4c163dcffdbe27fcdfe8c029e0a7b61316552a61880676719b8407b0d2cb122b28749b85cdde1

  • C:\Users\Admin\AppData\Local\Temp\AUTOUP~1\AutoUpdate.exe

    Filesize

    224KB

    MD5

    4aee00f2c19cb17b76599830ac4c7ecc

    SHA1

    d3e0e638af3978caf15c825a9aed33677a53ed47

    SHA256

    7998b011c1db4e4c05f642a644143938088b24b2b975300a5878de19e32b4c43

    SHA512

    a63c0d45ee765838f8325decd185967fe1b17de0c50859cf0d2758ef815f1429971992203828a7f3319eef09ab567d1cfabedb581318307990a828e66229c418

  • C:\Users\Admin\AppData\Local\Temp\AUTOUP~1\auto_update_uninstall.exe

    Filesize

    220KB

    MD5

    8b973520c82006021d6c26b602274d17

    SHA1

    2892964c335d85b304e59c731af56f7616d90d46

    SHA256

    2acbbefacd604c649fabc8912531ec96812de7c6d17872595960d1dd66acda7b

    SHA512

    b08f2565836e6bcfc2122a1f87c7bf847f22e9d3cb1bba73661f07e4f6573dabcee2e1431c82b631d22f4d44ee9ca36c4819aab8c9f80391d47558a82e6db307

  • C:\Users\Admin\AppData\Local\Temp\AutoUpdate0\setup.inf

    Filesize

    2KB

    MD5

    dc8ac3b6e47bc5593e2a4b78bd2e9473

    SHA1

    343bf3a7515b022c9ec8d24fa96a83d44f6b46df

    SHA256

    6135605b7c4d23d6fdc7528e2f8afe5b2b1629e7a961e4ce8523d6df97b61303

    SHA512

    0c6ab813d9e929cece789a5d5f579255650379446ad2d1019e06856346897bf694d52456f01e647500525a0e66e3385ab6344aa20091ac5dad756a4e21263267

  • C:\Users\Admin\AppData\Local\Temp\~APROP~1\ProxyStub.dll

    Filesize

    24KB

    MD5

    d8e41698a8568a5b3e6f4bdfc3607de7

    SHA1

    de219d55a17532eb52c06354228cd0e0d48994f1

    SHA256

    6dc80cb9df7a408349a7d5e0e01cd38dff5dbabb730ec6e3aefefec812a098ee

    SHA512

    b1836d5be50ca6f9b45817767428cc38d4f4723ededec3dd55ca156881fd00a8f1409deb431073c1fca7fc41475159e0ea2efc94f53c549753b088ffe17b1fdd

  • C:\Users\Admin\AppData\Local\Temp\~APROP~1\atl.dll

    Filesize

    73KB

    MD5

    31f0a6748435ba00f71c06839afdf38f

    SHA1

    0a94a263df35bf06763ed86bd0d94b2f181220a6

    SHA256

    a48ec9abbe81e2a1f0f6818f53dd7149284c323935efbb133b1bf7fdc712b192

    SHA512

    521d0fc2138343ed16e0cdf7499ff198e1e77f7dd8e36ac1d8d7cc82c66ae1055ef51485a5703322fba8d7dde8eb803690ffec39fbcc04ade564045403951f04

  • \Users\Admin\AppData\Local\Temp\AutoUpdate0\auto_update_install.exe

    Filesize

    252KB

    MD5

    63170d9d8a6c922a009a1f6a097bc95e

    SHA1

    9c38f12dade3756c0f5408b96e52bec4845b9bf0

    SHA256

    55af36d3279819cdacc0bad089f410448ddb6ffe5b75c066f1ac3fdeaae29aae

    SHA512

    3e755f8ca976e732a30576bbe78068cbb75db57a83ddedb914c1b1b143092667c3d1658119cc3faea7058c76e6d6cc33431161e28a9d08ac9b2d9600dfd64af0

  • \Users\Admin\AppData\Local\Temp\~compoundinst0\apropos_install.exe

    Filesize

    1.1MB

    MD5

    8437c00e7199d350790ca8579e725e7f

    SHA1

    15878cdeaadcb6608ab92acfa342e07c4fb848d2

    SHA256

    e77c570fb46b3454b8491c6988c9441b7f8ce3c96099b849e8c8d32e14b69697

    SHA512

    a2d08661fe2b1ebeb15abae6915a946afdf3a78ed154c39ceb16dd32e3d0a9e5d62e9e3f746a7d88cc0bcda06dc7d331dbd2d71853ace608f79dc0235636ea48

  • \Users\Admin\AppData\Local\Temp\~compoundinst0\auto_update.exe

    Filesize

    530KB

    MD5

    64d9a56e4d09320b436178254da30d11

    SHA1

    6c05a907a7246ebac4e90e8e7f3cbd4926687385

    SHA256

    818594b23b39c042e7df255f2b865a47c7fd9a69403bc2c4ec283967d7a3964c

    SHA512

    678bd38717fc4bed6e23e1fd4b6750df371b3e478306b811a16983b775eae71dd2372b06bfb003ca38c3ddb1d7052534f8056be478de9f6d263ffb70d57a0f67

  • memory/2960-81-0x0000000000340000-0x0000000000364000-memory.dmp

    Filesize

    144KB

  • memory/2960-82-0x00000000009C0000-0x0000000000B5D000-memory.dmp

    Filesize

    1.6MB

  • memory/2960-75-0x00000000002C0000-0x0000000000332000-memory.dmp

    Filesize

    456KB