Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 12:04

General

  • Target

    7829b4e252da9e2e228592ba9b74d754_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    7829b4e252da9e2e228592ba9b74d754

  • SHA1

    f0cb7a726de70d062b7f3be61fe2e67fef978031

  • SHA256

    9ace6903f3f41b024bc65d6e9b05a2d65346d3f9735110467e39dd33da19d6aa

  • SHA512

    85c355b956f28ebe103674ec401c884d7a1f3e76ddf5726052fe9321e7ca618e5de4e28b3c5da002d395fc8fe7eb15593b49129c351bdc8882640feff4414712

  • SSDEEP

    1536:olfYR5Y/RG3JT5L2dwvmdrBGofxmpMTui+9MXELP8bRrytGj7tVhkseRaCOMd5ns:n5wGZF8COMM

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 44 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7829b4e252da9e2e228592ba9b74d754_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7829b4e252da9e2e228592ba9b74d754_JaffaCakes118.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe advpack.dll,DelNodeRunDLL32 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2760
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Runs .reg file with regedit
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TempIE.reg

    Filesize

    2KB

    MD5

    bf050ae6f7573dbb0823dff030851dee

    SHA1

    46de6ffd8e85c6edce14aa9a730ca776cf1fad46

    SHA256

    9d483d5aa98bf9dc97306442769f4703f07e7ea3fce24fedd169e3b15d7385b2

    SHA512

    b708ec524211d7787e4540f2f7c6103720c2f523e26ea4c854558edc734e59bc6a4e14e350b4ebf1af7a75718fe85a7d28e765405f629c9304ef67fa3b246846

  • C:\Users\Admin\Desktop\Internat Explorer.dll

    Filesize

    91B

    MD5

    e83b9607cc6e5ed1f21cb66678ae52e0

    SHA1

    9f148380b2e8beb6035264f14a298691526d0dd2

    SHA256

    c01e56faf0a6cba82539f234eeae7a7b6553bdc2bcf942214eaad19357e5e1e4

    SHA512

    ee094d651a7eb902ad456d3644978667441a5693a81e6a11dd574eac37fbf018546d33d91e73ac3bdababbd66af0c6ae69675525448fa142366da99d14466c8c

  • memory/3024-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3024-13-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB