Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 16:39

General

  • Target

    74dc51cf472741bc32428c78f14fa556_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    74dc51cf472741bc32428c78f14fa556

  • SHA1

    efe30eda7b0e16dd54e7416895929ea6c8ab01d5

  • SHA256

    3f55c072f25ab4416d47d66c4b1e3e66d7c412af3a39042d9f16ebae3e2851d7

  • SHA512

    f2b8df9c1e7114b3ef1efd0ed220664ed8e677b30179e36e054b7c889e023d3745c67faef2c0ed745b8703802d397b535589616190a1e3aab9bc379b5889259a

  • SSDEEP

    3072:NL+okuO/vGYwtCvZLrAqxPyxofUH1CNpqZwHYYPGJDD3r4AExR0g:xbkDMYvZfTpffUVCNI5Db7E

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\74dc51cf472741bc32428c78f14fa556_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\74dc51cf472741bc32428c78f14fa556_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ADEEB~1.EXE
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ADEEB~1.EXE
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\SysWOW64\msiexec.exe
            msiexec.exe /i C:\Users\Admin\AppData\Local\Temp\MSIEEB2.tmp
            4⤵
            • Enumerates connected drives
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:2212
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Windows\Installer\MSI1096.tmp
        "C:\Windows\Installer\MSI1096.tmp"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\Installer\MSI1096.tmp
          "C:\Windows\Installer\MSI1096.tmp"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2456
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005AC" "00000000000005E0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f770f50.rbs

      Filesize

      612B

      MD5

      21d25e6dc8b7f54a5e7cc4d18767175a

      SHA1

      e3640823312a74da40bc756322f9518ca0687518

      SHA256

      f5601e4a3ba324d571b970989563328c8ea1ce6ddc4087139ab85f1a9313c324

      SHA512

      fa4ca75d008e46a61499ae8a659bf1ad7bcea130a1195f5b27d27cd0fa52550ca9ec8324f0f1e74d8d46491a36a07d0e678ba32a4a36482b2b51a411e208f8cd

    • C:\Users\Admin\AppData\Local\Temp\MSIEEB2.tmp

      Filesize

      113KB

      MD5

      0aee85cad0e5b032954d157fcacf02c0

      SHA1

      0b6968c01e61d168229f235d8a8423df75cb9e79

      SHA256

      f294807f5ce6625463878171190c338feabfc43002f168986b7ed7e1bdf816fe

      SHA512

      e63d1dbb8a9fe613d806b107ff33efe85116f9d3bccfed4ebc5baed8e09ed2c7abe6968e184739133b36d14a39fb4362e5fe3003050a96cdf2ab18ac4cf8cd85

    • C:\Windows\Installer\MSI1096.tmp

      Filesize

      61KB

      MD5

      778825b95601e34d8b1983671dfa7c9b

      SHA1

      156a2ca0db0c3c392b94b1a8b0c96e72ab7ff9d9

      SHA256

      0cde7fef3f83f0cb073cf621742a717ed144cf53aa4cb05fe749a77c732ae012

      SHA512

      d7532e3378dc2612d47e686f1b2f1281e84963ecaf780b2c36e891ff9474e7d4ad84b47363e68b2e54f5136c94c610a381ac5b5cc0e5b423ce99ddee00c45a3d

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADEEB~1.EXE

      Filesize

      101KB

      MD5

      d3c980832c20b77f1bc13f7ca9ee8dd8

      SHA1

      09cd942936f3b5dc74311d089a13e27f84531ec8

      SHA256

      626cb21a558da1f23c5cb1ba1e5afbd25e48a887a160571133660da2774aebd7

      SHA512

      cecdeacc20dba70a136d2a6e7c6fbbc91d479affa646e093867790617529c1af16b80671622faabfb7c22fa04e17ae7a67c490d46ab110cfc44a8af2de924ebb

    • memory/1232-51-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1232-48-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/2372-0-0x0000000001000000-0x000000000102E000-memory.dmp

      Filesize

      184KB

    • memory/2372-9-0x00000000001F0000-0x0000000000224000-memory.dmp

      Filesize

      208KB

    • memory/2372-18-0x0000000001000000-0x000000000102E000-memory.dmp

      Filesize

      184KB

    • memory/2372-1-0x0000000000170000-0x000000000019E000-memory.dmp

      Filesize

      184KB

    • memory/2372-2-0x000000000102B000-0x000000000102C000-memory.dmp

      Filesize

      4KB

    • memory/2456-60-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2456-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2456-37-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2788-10-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2788-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2788-14-0x0000000000430000-0x0000000000431000-memory.dmp

      Filesize

      4KB