Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 18:20

General

  • Target

    70b772a75bbcad407131444efb15d5c9_JaffaCakes118.exe

  • Size

    336KB

  • MD5

    70b772a75bbcad407131444efb15d5c9

  • SHA1

    c0964ffe345bc562d3c05a23802f0579ee777196

  • SHA256

    793957c4a418bc13c3def9d250e8d449b0190c7043437a8e2d318688c3b322e4

  • SHA512

    6f410dcc5f9a1448479823acb525fdfc65b5e8d7769602c5f298054f2d8d190fd801e9faede2d52e4678ddd4f9da0603e555055e4754350e4b7afec26f029be1

  • SSDEEP

    6144:OUsPYNU97D4SMUQMI4TdK0DcE157Dylc30eAz71L/rpI+M:OTPY2CUQMdbIE1lylc3bAtO+M

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 7 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70b772a75bbcad407131444efb15d5c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70b772a75bbcad407131444efb15d5c9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:1100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 516
          3⤵
          • Program crash
          PID:3508
        • C:\Users\Admin\AppData\Roaming\1.exe
          C:\Users\Admin\AppData\Roaming\1.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • NTFS ADS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /s "C:\Windows\system32\mswinsck.ocx"
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:1216
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\1.bat
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3492
          • C:\Windows:Server.bat
            C:\Windows:Server.bat
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • NTFS ADS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3784
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4880 -ip 4880
      1⤵
        PID:1524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp.exe

        Filesize

        324KB

        MD5

        388b41885562f569a0290a72f4eae360

        SHA1

        19ef1cf03c27d8ad67a114040fc1978916feab52

        SHA256

        7991626cf2881f5334441d46b0cbd7afee6134efff1b956d4b7b9658bdb6bcb9

        SHA512

        3de0c0a22cb426191820e2a4e0fc7dedb5b797b7e2dbc9bc9ae253e67edaeb71073b5ed267744a6789e4f56698c981ffce6a52940d3e8d24c699cf78fc24ee63

      • C:\Users\Admin\AppData\Roaming\1.bat

        Filesize

        113B

        MD5

        30fb8674b40c1dc7958909ba1584b37e

        SHA1

        d35c5a768c6e655175571c4bfe3c485e24d47f2e

        SHA256

        11e9fcb10ce29674d8bf41ca773837207427409f108c01c882cfe21427c7dbed

        SHA512

        63049a21a3bb72795c247400350a2f84c00db8def7cecd7a800e0a9280b622fda4f259bfe4cbde2a6f3cf200973d5dfda838479f76a20d5a5d50b697413bdd9e

      • C:\Users\Admin\AppData\Roaming\1.exe

        Filesize

        296KB

        MD5

        256321ff1de80bee3fda310067cf5152

        SHA1

        79b332743dbcc50e2b6d50ae677a91d268585760

        SHA256

        95c55afaeca9b907300cffb680c3420c7ca48b054454e5e0c1ae17306d47ff49

        SHA512

        d4374db003504f8dd4b55f0caa814bdd6159541d3b99222ca3a982ed2ab26a9e885627e1baf870a04c7ad8e86fbe552de5d55264c83fec893291201d8de2e277

      • C:\Users\Admin\AppData\Roaming\kernel33.dll

        Filesize

        625KB

        MD5

        358611b92e360a749054fdc7b6b076ea

        SHA1

        d6d2224161fee024ab3767a81ed57f7e57d0c1ce

        SHA256

        79782a87dfd093a0e4196d6f0aa4d46a55c0290f6145f5f8fa60e53c540f89b4

        SHA512

        0986c84ed52b42b3aeb96479032e188165d1fa1d5c7018e240b444e03eb6317365ea51fc0233263f7e97f099cd3ca3094ab0b177c0405816bc800b41f42523ad

      • C:\Windows\SysWOW64\jpg.dll

        Filesize

        51KB

        MD5

        4eda362e326609a0a80e2736b67607ab

        SHA1

        64aa572d16f7cd6e6bd2296f2c96ad1604c713d1

        SHA256

        061e9f721af9a538dcfd96d13cb3deef1479b5785f566818c34c3faa585d650a

        SHA512

        f23f6a5c362808aef98516dcf12e3eeefd8498c812c27f96820d7d086694641cb4eefc7970b4750a0e4a5a0be1f90ac8981fc2f028e7085d50bd44bd4880c51d

      • C:\Windows\SysWOW64\mswinsck.ocx

        Filesize

        105KB

        MD5

        9484c04258830aa3c2f2a70eb041414c

        SHA1

        b242a4fb0e9dcf14cb51dc36027baff9a79cb823

        SHA256

        bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

        SHA512

        9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

      • C:\Windows\SysWOW64\zlib.dll

        Filesize

        27KB

        MD5

        200d52d81e9b4b05fa58ce5fbe511dba

        SHA1

        c0d809ee93816d87388ed4e7fd6fca93d70294d2

        SHA256

        d4fe89dc2e7775f4ef0dfc70ed6999b8f09635326e05e08a274d464d1814c617

        SHA512

        7b1df70d76855d65cf246051e7b9f7119720a695d41ace1eb00e45e93e6de80d083b953269166bdee7137dbd9f3e5681e36bb036f151cea383c10d82957f39c5

      • memory/2532-30-0x0000000010000000-0x0000000010014000-memory.dmp

        Filesize

        80KB

      • memory/2532-27-0x00000000005C0000-0x00000000005E7000-memory.dmp

        Filesize

        156KB