Analysis

  • max time kernel
    26s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 21:25

General

  • Target

    75c9c7c89f3b56fcb5e73229a00e8b4d_JaffaCakes118.exe

  • Size

    128KB

  • MD5

    75c9c7c89f3b56fcb5e73229a00e8b4d

  • SHA1

    ea1486902ee3f27a3ccd6de72d455ebc22029747

  • SHA256

    f05fec07941e9c9b29ac7cb452c3d4e9a4508464ff72c0ff5e46ec0c5792544f

  • SHA512

    f8994bc564ac190294ad37633814b4814ecefc631d8882e42eca780510ab6ea6aa8ca4194a9c3d3207fd72bb9d85c4e2bc1b83e62ed1d80bf40a1b5c729129ef

  • SSDEEP

    3072:kO1HUKNu8Q9fVtaNYLTC+U+FS0Y7AeXIDoquhuiDHkc6:b1HUKp6faqx/s0dVcquMiDkc6

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75c9c7c89f3b56fcb5e73229a00e8b4d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\75c9c7c89f3b56fcb5e73229a00e8b4d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\msxml71.dll

    Filesize

    102KB

    MD5

    2fd49fdcb7f9a4477c0edabe44deab4e

    SHA1

    f72771dbf27ce336f2d359b33e08f0b0263bf48d

    SHA256

    fa5effedb1b2696dc52510c75941861d89c18c4c3e1371dee162643811f54209

    SHA512

    9ea72a70946b5e15044beb66c4d9ff659527dd00b0f7d6e2091fe18a358540bac6ecfa14e906d77d7d848d0bad849528086b41ad19843f6b10f8a3fb15073f71

  • memory/2172-329-0x0000000010000000-0x000000001004F000-memory.dmp

    Filesize

    316KB

  • memory/2172-17820-0x0000000010000000-0x000000001004F000-memory.dmp

    Filesize

    316KB

  • memory/2172-32493-0x0000000010000000-0x000000001004F000-memory.dmp

    Filesize

    316KB