Analysis

  • max time kernel
    137s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 10:07

General

  • Target

    6f2425838f8d3b1a3522434a638f3aee_JaffaCakes118.exe

  • Size

    128KB

  • MD5

    6f2425838f8d3b1a3522434a638f3aee

  • SHA1

    4458c2a4c6a5a27599737db83f6d4ce5a5df0416

  • SHA256

    44b525c9b301e86ff359d4cca39f0a8ab94646609643a04874c3a431644d62e2

  • SHA512

    0461ebf6389952e19782a033feebb8cf649440ef3b177f7213c235b7126255ffb4df8cab8146b9f372796e10ff697aeab10bf7bef67db24706d050ed3b9826bf

  • SSDEEP

    3072:EmeDmBqskJjfcTJ1Q6j2QtKHjrddac1ANbzZdKkb:E8tJ1zGjFCJd

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f2425838f8d3b1a3522434a638f3aee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f2425838f8d3b1a3522434a638f3aee_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Common Files\PushWare\cpush.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\PushWare\cpush.dll

    Filesize

    208KB

    MD5

    d3d7021dccf955e3bf53348ba4635dcf

    SHA1

    623cd2fb2e409ce5f55baa7dbb87a2b4142567ff

    SHA256

    b37d8c895258cccb982dc4bfbb7b62fd8420c589166f3adbed8cdfa0257b9ed6

    SHA512

    f91e22fbbc9fcef36b29d93ae553a57bea9a28133bb6058525e680b736c97be47de47da18ec92d43539647f4b9dcf2cd790fa8edfa26458d4bf93b669bf271bf