Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 21:45

General

  • Target

    64e76d2215a6b01cb2bebc0bafe5b9e6_JaffaCakes118.exe

  • Size

    5.2MB

  • MD5

    64e76d2215a6b01cb2bebc0bafe5b9e6

  • SHA1

    a5df8547629b854cbd3529bac40e3f40eb5f6820

  • SHA256

    d0902c6d183f4ab00c64dd9b787ec0d3719616aba79403f85e3b221f1f0c51c4

  • SHA512

    ab523f307c3c91f85950f550857b92642c5e18dc2f23eb786527a0e580659161bc99c08308eca3b27eeb3ced3ecaee66e74e8d01692fbf6af772c4b2fcd424af

  • SSDEEP

    49152:T/yJ4INy79445JsZkjfEqmYuGVwmec8PwfFgy/BqC9icj8YrxaJh05R5m9jd/Crg:Q

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e76d2215a6b01cb2bebc0bafe5b9e6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\64e76d2215a6b01cb2bebc0bafe5b9e6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 412
        3⤵
          PID:2684
      • C:\Users\Admin\AppData\Local\Temp\CFPRO.exe
        "C:\Users\Admin\AppData\Local\Temp\CFPRO.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:2236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      46d586cec39f2db5d0d29ad39d339797

      SHA1

      faeef8f468d700b11b4aa730f81e0ae5c9d26eb4

      SHA256

      c6495ffcb76c5e6e205fab3e0089fa2e173d4267f89eeee6c9d48a2138d95a3e

      SHA512

      2add447f968f1742524deb9232a9205ac2afb90e52371ceac3cd9e62892a35c80e5e6e067733db2864f562cc4bf125a9ed521941b4af4cee392498d3cd1357cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      aa84ff23702215b2d36fea657d1dfefa

      SHA1

      77d808eab3ffb03627292ca2779dfc9712f286d9

      SHA256

      4649caa1842f69cb5d11618340b674f7146a009c78ceda4955e26e9f7a1e72c1

      SHA512

      435df68d39d255e733570f37e4a77aa5b06ae3e80a22144c4fa86359d66764f84ede5ed28a9fe34f54d9840cf9e3298a85ec7cf14c7bbc9be8a4f4c8c29748d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8af9135bba70f83c5225135774cd8d04

      SHA1

      f9c4c7c781ae181b8b7018d9fc519a234aa0eb4b

      SHA256

      82a8beae8dbdd7a29a5725ddc0653f7500292706c4183f078ca662d2576e71bc

      SHA512

      1c7a150edde4da85758644e64ac76177363165c03fd337105cbf83f5e6310c3f297b74209432ff51987b5dc97018d9317999bdf97a5ef44cbe3972fe18b87577

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VX38S3F\dmedianet[1].js

      Filesize

      100KB

      MD5

      0dff3490ef59430ef63af0ce9dd81bf0

      SHA1

      4986152523ae3cf1350ee18de1cb1852e0b31565

      SHA256

      a8143202d05a257d5a653d0a3f7877a0846e794c9e7107ae265595cdceb16275

      SHA512

      c1601cfc0bf9a1844f913de1187ffac767d3f1a11fa42ed6dafc91b79fde6172d53c009faea9bb6de62eb02419ccffb6c2ea1bbd6706441ebbe93f62e639ddec

    • C:\Users\Admin\AppData\Local\Temp\CabB260.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB273.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\CFPRO.exe

      Filesize

      1.4MB

      MD5

      9e5892c0821f329b758bb4cb6da06e99

      SHA1

      a493db7ccf16f08fb9e6e8ff142d2671d85a47ee

      SHA256

      eecc2e43b16d8c2a48f8ece57d727984c55956d2ac0cb06b8829c6a5e7dd9ea7

      SHA512

      7e3cf9f144fecaf85b1d4153bfc5bbc4496cc67a4e20da0fe6029d3dab821e27413bd53c1ab0722e668e4ce1ce8bdb4b2783e68f7f78a5aed4cfdc705a64e11d

    • memory/1188-19-0x000000006F911000-0x000000006F912000-memory.dmp

      Filesize

      4KB

    • memory/1188-5-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-6-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-14-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1188-544-0x000000006F910000-0x000000006FEBB000-memory.dmp

      Filesize

      5.7MB

    • memory/1188-20-0x000000006F910000-0x000000006FEBB000-memory.dmp

      Filesize

      5.7MB

    • memory/1188-21-0x000000006F910000-0x000000006FEBB000-memory.dmp

      Filesize

      5.7MB

    • memory/1188-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1188-10-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2236-35-0x0000000000400000-0x00000000006C1000-memory.dmp

      Filesize

      2.8MB

    • memory/2236-34-0x0000000000400000-0x00000000006C1000-memory.dmp

      Filesize

      2.8MB

    • memory/2236-147-0x0000000006A00000-0x0000000006D47000-memory.dmp

      Filesize

      3.3MB

    • memory/2236-545-0x0000000000400000-0x00000000006C1000-memory.dmp

      Filesize

      2.8MB

    • memory/2444-39-0x00000000747C0000-0x0000000074EAE000-memory.dmp

      Filesize

      6.9MB

    • memory/2444-32-0x000000000B610000-0x000000000B8D1000-memory.dmp

      Filesize

      2.8MB

    • memory/2444-4-0x0000000000430000-0x000000000043A000-memory.dmp

      Filesize

      40KB

    • memory/2444-3-0x0000000000420000-0x000000000042C000-memory.dmp

      Filesize

      48KB

    • memory/2444-2-0x00000000747C0000-0x0000000074EAE000-memory.dmp

      Filesize

      6.9MB

    • memory/2444-1-0x0000000000AE0000-0x0000000000AF8000-memory.dmp

      Filesize

      96KB

    • memory/2444-0-0x00000000747CE000-0x00000000747CF000-memory.dmp

      Filesize

      4KB