Analysis

  • max time kernel
    138s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 20:18

General

  • Target

    68c66a99db1e44c5aab1d4ac940cc3fa_JaffaCakes118.exe

  • Size

    561KB

  • MD5

    68c66a99db1e44c5aab1d4ac940cc3fa

  • SHA1

    c3a3b367eaa55c520734105335dc7622c878d62c

  • SHA256

    06a2c295a3b3c1c7c72e6ad3b3b1f040a3dc5edf43031caaa2eee35f9edf9358

  • SHA512

    afe62e9622030a1aa30333a7c460ba0654306889605f7540c37964bfb0b3f7d3d754f632d02fd32e8c696cc9669ce2220befd3d360872f9409f71267d8fafd7d

  • SSDEEP

    12288:63LtZ+cURBBRrTs1Y/uewZnKGiHY+mR9+rlj8e3kmMarv+EVQzxNsc5X:KtZ+cUfBRcYiFKbHYx3G8e3tMarzQr

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68c66a99db1e44c5aab1d4ac940cc3fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68c66a99db1e44c5aab1d4ac940cc3fa_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\cacls.exe
      cacls "C:\Windows\system32\usmt\3368" /t /e /g everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4460
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s C:\Windows\system32\usmt\imczoavey.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4752
    • C:\Windows\SysWOW64\EXPLORER.EXE
      EXPLORER.EXE /e,C:\Windows\system32\usmt\3368\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3792
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$306609.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2316
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\$$306609.bat

          Filesize

          182B

          MD5

          6a4ae4e5455311c22f32e44a57d5b986

          SHA1

          3c9b6e1eaf7051db207a0dd21dc2ea22b0943151

          SHA256

          b44c09df556d2b872d0773188c169569c41a5159ec04907192fd47e3a12170de

          SHA512

          f36c4872d0f1959fe848efec0227e1fb6105375f2b19edd484ff9e77bd2ab08695ca242fcb270e722e2d88696e3c8967c133c7317e74e11b4b625d1078f72918

        • C:\Windows\SysWOW64\e6e3bbd21a.dll

          Filesize

          138B

          MD5

          858453df9f337a4a24ae872e8fcf7678

          SHA1

          681461c9944f02677935554644f0530cfb94630f

          SHA256

          420791578e643d743639d93cdea23f32e85d08a71ed76ee54167274c78a3bf71

          SHA512

          97ca4afde70a6b71172a20a8fc8164d45bc58eb0cd17d00bf8df49ea4a7b900d092e2468bd23627e31b5480e9113dcadfd43c2b3e1f4764c06ba423b494438c8

        • C:\Windows\SysWOW64\usmt\imczoavey.dll

          Filesize

          280KB

          MD5

          04a9f33312e0f3ecac1ee2f0e4beab04

          SHA1

          f3792b49396fc3cbe041999234c4c544aeeee4da

          SHA256

          a709fcf49b60c46bde08c97c3295055ef1dccbae1d6453cc32e0d4c20072a656

          SHA512

          d3ccc493f67f5603e182344a9d22ff546f016bb50b63c4b980aec2f2c993d78e68fa249676e552063943790184d3b90fe72bce1082965e337592b4407d9269f4

        • memory/2616-0-0x00000000023A0000-0x00000000023A1000-memory.dmp

          Filesize

          4KB

        • memory/2616-24-0x0000000000400000-0x0000000000508000-memory.dmp

          Filesize

          1.0MB