Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 16:48

General

  • Target

    74e4508df91dcca124c3b0d6eb2fab17_JaffaCakes118.exe

  • Size

    488KB

  • MD5

    74e4508df91dcca124c3b0d6eb2fab17

  • SHA1

    0e0af57d62b126c4cab4f396aa3f659374b95280

  • SHA256

    a4a83823b8e512afcb9b6a621d555cfe48afa6b65d3dfc2fa3e495eed6314b0f

  • SHA512

    a77dec8840dbe293091416e0e4c6f510801c32fa57e92fd52d66798d9e0be792a4d6e64fdd10cfb554c4ea6e403384f47195a8489b394d4743fd92728c7a8335

  • SSDEEP

    12288:wNSIpoJ3vpAALhchj5m6dCdiIp1gcxZh2uUyqfY45FiDhyaKjK8:wIJ3BAlhj74diIHgYh2u3qt2DhA28

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e4508df91dcca124c3b0d6eb2fab17_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74e4508df91dcca124c3b0d6eb2fab17_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2736
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:932
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:820
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1860
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1788
    • C:\Windows\SysWOW64\b55d.exe
      C:\Windows\system32\b55d.exe -i
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4492
    • C:\Windows\SysWOW64\b55d.exe
      C:\Windows\system32\b55d.exe -s
      2⤵
      • Executes dropped EXE
      PID:848
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:376
  • C:\Windows\SysWOW64\b55d.exe
    C:\Windows\SysWOW64\b55d.exe
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

    Filesize

    192KB

    MD5

    964b30802e413e95544519d456102fe6

    SHA1

    494c682b7c35e34599a7e3fbe74a01ce24856112

    SHA256

    4e43a692b980122d3c3f03467ce9245b4e0ae5f269ef298baf44861dcd79e133

    SHA512

    d249d6938b9abba23ca16f8ae9afc2cdc9d56c30384b2924ac823a9dcae33353949c978e5975056bd57e4a63d1df47e506b2abf6537f9b95cf178de2154eb3cb

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

    Filesize

    456KB

    MD5

    b517e6b129387e23410d3eb7f1519747

    SHA1

    e6e15a3f0364aad2e512ae4cdafd36e9a7a7d85b

    SHA256

    5d596d71f4bac0e6a22c3987dfa2487ad8a4affad25f18be716c3220851b57d2

    SHA512

    bdf9904991877cdc073adaf9de96bbbf53344648b4df9ee22d71a82cef5ba4696b653b43af839960901a8336e8a655f4cdfc5bceea9f11737d41a7b5992f59e4

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe

    Filesize

    168KB

    MD5

    18395fa4aa374e9885a1119d47ef8c61

    SHA1

    f661efdbf254ac7094d4e55fd7b96d656dc9cf89

    SHA256

    085f9f70cda77e1b723eca36534f75e81be79e97f761df486197685b08a75fe8

    SHA512

    8c3cab660dbc07540cb99c22337f689929d64fd3418d20cf8c7826b1e2574452a90d0fbd27431beb98d41bc4f86db7478115b316c5523d2e3d481f3d1bbf9e43