Analysis

  • max time kernel
    44s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 10:42

General

  • Target

    73b5d8e5d68000178099b40fbd87a357_JaffaCakes118.exe

  • Size

    933KB

  • MD5

    73b5d8e5d68000178099b40fbd87a357

  • SHA1

    5be2b7cd0d1c6f30b3a746e26bfe179ccc628b3a

  • SHA256

    591a807a568660e7180d9e7b47a47c26422c6f97313a0aec39c7f301c3736a73

  • SHA512

    4a084954cbb9b2f494adaf66329e113151a95492b102041639c0f98d7eff21bb19062c129763f685d0857cf4229c8f361c94c9a287ba2f3daef32c1ba42caa0d

  • SSDEEP

    24576:THht6pOsAebvfVd8Fwc4MHiLCTDErkfK53JZfmWpwVPNQnM0jd:G6K9drcjbTDtWZZ+aSuM0p

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b5d8e5d68000178099b40fbd87a357_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73b5d8e5d68000178099b40fbd87a357_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe
      "C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2744
    • C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-top1.exe
      "C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-top1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk

          Filesize

          1KB

          MD5

          5dc5034512d3d0c5863505b122c67e07

          SHA1

          e90389028b2f1b5f6812e7890a6d40cc6aeffc1b

          SHA256

          5284c54137d64c3c7aa5d8a50d7fe05e1583827e8f100007ba66d71a0df9aa9c

          SHA512

          1fba8235b4dfae2118e801426c70c94d8de1ee1ba9c420239d9b9146d7d91a37c0f7c41f295ff7c167410af73cc0d247b2e6ad0de03ffd63d28c83c8f4daa5d5

        • \Users\Admin\AppData\Local\Temp\Baidu-Toolbar-top1.exe

          Filesize

          842KB

          MD5

          dd8565516a8adefe7cd353759f623331

          SHA1

          34ef17f0385f4deae7b5cadd78f1a6039b4ff978

          SHA256

          6fbc37f44470f86b47516dedd1ba86de46dd2716bb42739b0a4e5d540cc111df

          SHA512

          19a61451e8b22c7baece0330297f3b3d35a97182b180a158571e0043784f935d2e9a0d7b3d3a621c1619962f08c2883e9d71b992a491e7ca4abc1ccf53714725

        • \Users\Admin\AppData\Local\Temp\max2_133daohang4.exe

          Filesize

          59KB

          MD5

          698a97c92a639a6e811cf501a7bb06c1

          SHA1

          9883a06ca120b000392c6af5aa3f4ba1a627321a

          SHA256

          d1e089d33b48745a61338d671e77c87cf99baa7a9d42d9dc8af7b91e728cfb5f

          SHA512

          6d5bd9da612e23e5a35459b8a6223d354a442897f9a33ab6e17fe21d3b9e3f78e88a952f7e1d5e20a5a1d6181f8fcd63848af0c3200c45d2bd7230b13a7f7a5c

        • \Users\Admin\AppData\Local\Temp\nst94F1.tmp\InetLoad2.dll

          Filesize

          18KB

          MD5

          5e08ae18abcc8fc1cd639fed7e276eaf

          SHA1

          10570a62a2c5c41ef2939e101617416f9a8acfe3

          SHA256

          c7e1cfd7b1f3b446dd12dc35d36ed2c7e1e30b471ea47e8d8cd6b40f6ff84a2b

          SHA512

          f8bb2dd54d1ea9bd2bed565903af2eb06995baec5c1480c6b73af9f51639ed259e510b87d8248f4551b004e4d2aa030af5f161b486233d6e45bbc152fe8bfa71

        • \Users\Admin\AppData\Local\Temp\nsz9426.tmp\ShellLink.dll

          Filesize

          4KB

          MD5

          073d44e11a4bcff06e72e1ebfe5605f7

          SHA1

          5f4e85ab7a1a636d95b50479a10bcb5583af93f3

          SHA256

          b96b39cb4ad98f4820b6fd17b67e43d8d0f4b2667d50caa46eff44af245d75bb

          SHA512

          e9f99b96334764ae47aa026f7f24cfb736859a9131bd1c5ec7e070e830b651787f49910911f82e4ade0dc62fea0ad54ba210b07e44830eb2be6abb710a418a98

        • \Users\Admin\AppData\Local\Temp\nsz9426.tmp\System.dll

          Filesize

          11KB

          MD5

          00a0194c20ee912257df53bfe258ee4a

          SHA1

          d7b4e319bc5119024690dc8230b9cc919b1b86b2

          SHA256

          dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

          SHA512

          3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667