Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 18:20

General

  • Target

    70b772a75bbcad407131444efb15d5c9_JaffaCakes118.exe

  • Size

    336KB

  • MD5

    70b772a75bbcad407131444efb15d5c9

  • SHA1

    c0964ffe345bc562d3c05a23802f0579ee777196

  • SHA256

    793957c4a418bc13c3def9d250e8d449b0190c7043437a8e2d318688c3b322e4

  • SHA512

    6f410dcc5f9a1448479823acb525fdfc65b5e8d7769602c5f298054f2d8d190fd801e9faede2d52e4678ddd4f9da0603e555055e4754350e4b7afec26f029be1

  • SSDEEP

    6144:OUsPYNU97D4SMUQMI4TdK0DcE157Dylc30eAz71L/rpI+M:OTPY2CUQMdbIE1lylc3bAtO+M

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70b772a75bbcad407131444efb15d5c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70b772a75bbcad407131444efb15d5c9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:2376
        • C:\Users\Admin\AppData\Roaming\1.exe
          C:\Users\Admin\AppData\Roaming\1.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • NTFS ADS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /s "C:\Windows\system32\mswinsck.ocx"
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:3056
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Roaming\1.bat
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2724
          • C:\Windows:Remote-Controller.bat
            C:\Windows:Remote-Controller.bat
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • NTFS ADS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\1.bat

      Filesize

      113B

      MD5

      30fb8674b40c1dc7958909ba1584b37e

      SHA1

      d35c5a768c6e655175571c4bfe3c485e24d47f2e

      SHA256

      11e9fcb10ce29674d8bf41ca773837207427409f108c01c882cfe21427c7dbed

      SHA512

      63049a21a3bb72795c247400350a2f84c00db8def7cecd7a800e0a9280b622fda4f259bfe4cbde2a6f3cf200973d5dfda838479f76a20d5a5d50b697413bdd9e

    • C:\Windows\SysWOW64\jpg.dll

      Filesize

      51KB

      MD5

      4eda362e326609a0a80e2736b67607ab

      SHA1

      64aa572d16f7cd6e6bd2296f2c96ad1604c713d1

      SHA256

      061e9f721af9a538dcfd96d13cb3deef1479b5785f566818c34c3faa585d650a

      SHA512

      f23f6a5c362808aef98516dcf12e3eeefd8498c812c27f96820d7d086694641cb4eefc7970b4750a0e4a5a0be1f90ac8981fc2f028e7085d50bd44bd4880c51d

    • C:\Windows\SysWOW64\mswinsck.ocx

      Filesize

      105KB

      MD5

      9484c04258830aa3c2f2a70eb041414c

      SHA1

      b242a4fb0e9dcf14cb51dc36027baff9a79cb823

      SHA256

      bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

      SHA512

      9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

    • \Users\Admin\AppData\Local\Temp\tmp.exe

      Filesize

      324KB

      MD5

      388b41885562f569a0290a72f4eae360

      SHA1

      19ef1cf03c27d8ad67a114040fc1978916feab52

      SHA256

      7991626cf2881f5334441d46b0cbd7afee6134efff1b956d4b7b9658bdb6bcb9

      SHA512

      3de0c0a22cb426191820e2a4e0fc7dedb5b797b7e2dbc9bc9ae253e67edaeb71073b5ed267744a6789e4f56698c981ffce6a52940d3e8d24c699cf78fc24ee63

    • \Users\Admin\AppData\Roaming\1.exe

      Filesize

      296KB

      MD5

      256321ff1de80bee3fda310067cf5152

      SHA1

      79b332743dbcc50e2b6d50ae677a91d268585760

      SHA256

      95c55afaeca9b907300cffb680c3420c7ca48b054454e5e0c1ae17306d47ff49

      SHA512

      d4374db003504f8dd4b55f0caa814bdd6159541d3b99222ca3a982ed2ab26a9e885627e1baf870a04c7ad8e86fbe552de5d55264c83fec893291201d8de2e277

    • \Users\Admin\AppData\Roaming\kernel33.dll

      Filesize

      1.1MB

      MD5

      e14ba6a9464bed1127c50214acaf0c1a

      SHA1

      3eeda63ac8209ffa2e1beeefdde6531e61f8dc4d

      SHA256

      fd250c2054019c58dd71ac4469ee821b67dfa36a439091ad17969f6d4090da38

      SHA512

      55a7ad5ea8617e8066b2854556e54e1688c70d80b6921eab3020a1bb6cc741320f5f0d63cf067864505877e010d69caa2a7bff890dd037da7efbc3e679ab9c26

    • \Windows\SysWOW64\zlib.dll

      Filesize

      27KB

      MD5

      200d52d81e9b4b05fa58ce5fbe511dba

      SHA1

      c0d809ee93816d87388ed4e7fd6fca93d70294d2

      SHA256

      d4fe89dc2e7775f4ef0dfc70ed6999b8f09635326e05e08a274d464d1814c617

      SHA512

      7b1df70d76855d65cf246051e7b9f7119720a695d41ace1eb00e45e93e6de80d083b953269166bdee7137dbd9f3e5681e36bb036f151cea383c10d82957f39c5

    • memory/2692-36-0x0000000010000000-0x0000000010014000-memory.dmp

      Filesize

      80KB