Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 23:47

General

  • Target

    763faa83f40257c193f073bd54b0f5de_JaffaCakes118.exe

  • Size

    251KB

  • MD5

    763faa83f40257c193f073bd54b0f5de

  • SHA1

    a6769a66b377ca7791303bc880a260284b93aa87

  • SHA256

    1e9b1b15ecfec97676fb34d812eaecd96816dacba7faec43442b1324a670486e

  • SHA512

    8aecbce34ea1818ee7d7f808cf0be573a796284728da868ee67e6f9f0b17e4ae018eedf5ebb55375889e372e39fa4dd48893ecd60e88a685bda72ebeea379c94

  • SSDEEP

    3072:ZFF++3/4VEav0dEixtdrze+rsXSyLoz2B4iS06RA6o6jlKZwoOkWUEvRouccMU4d:ZiogVEavixTDy1h8Rm4l9hkW5RouRm

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\763faa83f40257c193f073bd54b0f5de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\763faa83f40257c193f073bd54b0f5de_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\gr47170.dll
      2⤵
      • Event Triggered Execution: Image File Execution Options Injection
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2480

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\gr47170.dll

          Filesize

          232KB

          MD5

          7301cfadd110dbc9299c811036c8a252

          SHA1

          0c1890b0dbe4bf4509abaea7fd6b3d6bb74e2236

          SHA256

          9ca261dfb454348f900b54ed07b3450154bee8b31a424002b9db7e0693b714e7

          SHA512

          af0a24f07a2be3b734b8ca82b260f8f48ca8322bc5efb897274c791f7fdba6a7fe76e865188298ea5fc459d4d3834b48102bf71ff83e37cc0c4fc39212797871