Analysis

  • max time kernel
    137s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 11:19

General

  • Target

    78044019f77916fee0b21d1a3dec9f10_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    78044019f77916fee0b21d1a3dec9f10

  • SHA1

    a966f862ec2e3065c57683ca48ae225bab5180ab

  • SHA256

    ffebdcf761ac42e8c5d0750bd756bded89e8cb28e9a694ab3a57383bd4c970c2

  • SHA512

    92758a5a041b768da6d609a25827b4f1d883ac5318d687eedd743868e694b0908af21b783441b84caf1317636d9b35890a9ec41af6bc05309aaed43b1260b7ab

  • SSDEEP

    6144:p92AKw2Dd1CGxDTx6ENVAyWNgrzuRXGF88/HfaJhXm:p0AKhvgEbAlgCtefchX

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 32 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78044019f77916fee0b21d1a3dec9f10_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78044019f77916fee0b21d1a3dec9f10_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Roaming\printer.exe
      "C:\Users\Admin\AppData\Roaming\printer.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies firewall policy service
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • System policy modification
      PID:2792
    • C:\Users\Admin\AppData\Roaming\npad.exe
      "C:\Users\Admin\AppData\Roaming\npad.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\E33E.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2452
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\E2E0.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E2E0.bat

    Filesize

    259B

    MD5

    c94bf8d31af5b530940bfd8272a26d6b

    SHA1

    1607c6e3d4727a0d765e355b00c380f20014ba3a

    SHA256

    c083e28bcced815467458d5b8653f63794055d18d62090f7b5ed20dcbee0fb0e

    SHA512

    95a2855604d13228875f82c81770aad35daa7a30448ada9d961ef5444eb5ecf4fb1c0670fe9afc4103e85f0bdbe113d6774930ed786874b51b41451282da0e2e

  • C:\Users\Admin\AppData\Local\Temp\E33E.bat

    Filesize

    169B

    MD5

    a52cc5f6b63e27f50e4007d2a930bbd2

    SHA1

    bafe5992debdf57766aae40ef3ef3d4be9dc2e45

    SHA256

    b87270bdae3b1b4130fda73b64e78795f2e8645fcbe353f862f04882a55883e2

    SHA512

    4c23445f5e711af7e34065a4dfeaea56f1310d87e833735ced91fe0012d892d2c15e8c29a94a73c105d3d53dcf57adbfe6b85a6fc8c67d9aee0e9c3dfcd1b6d8

  • C:\Users\Admin\AppData\Roaming\printer.exe

    Filesize

    76KB

    MD5

    b5cc2c60341b5950e9fad7a00ea7b05f

    SHA1

    0a28b51a61a7057efc05f3aba13db43b21cde0f1

    SHA256

    33fb4da8e40fefdabe9351af64bb073b45777894ab006b81056dcdf4affe1e6d

    SHA512

    25fdf48da73a7558730cb92552cc958a19b2bdfda7df9ab5abdc91612765b364ebade3518fcbd52490c78cf80e007d4e196f6afdba963a6d1b9835190c5d628c

  • \Program Files (x86)\altcmd\altcmd32.dll

    Filesize

    180KB

    MD5

    d602673268d6498ee95742aba16351e9

    SHA1

    75652a3a73095ebb18d43bb9aef5ffba62d2a52f

    SHA256

    fad1ee29098f536856649cf2e329437a970b6873605e4856d36ad800adce81b5

    SHA512

    569c125cc403f6f0c426d98044e104934bd9f1b59cce6457dec65a842f2ffa4b52bdd99f55d577c027503e0bd7404f5bcded8b7c6da635bdc8ffa5b1ac22104a

  • \Users\Admin\AppData\Roaming\npad.exe

    Filesize

    204KB

    MD5

    9d0d44f7e2da814b874cac61e37b865f

    SHA1

    59f4cf3144d5f9ddc9e7b839947c934141fd2e5a

    SHA256

    fe7418b6d4afdb28d9c3b5a3e56a9f0e856d8800ca337f781dda22327b71a504

    SHA512

    8515ee449faf55de31e998f085985a3e407d7b3b0f45a63efd4bfa5e02be44b573efc3a952b69ddf576f96cc7d5004c65086d26f9d74d78b246c117211c808ba

  • \Users\Admin\AppData\Roaming\nvsvc1024.dll

    Filesize

    56KB

    MD5

    dd4afbcf01b1eeff176324dd83682e20

    SHA1

    4e5b4eea02e0365ce97a059a456cf769c4017353

    SHA256

    a258f68eae18fae9d0fb7110527a8dd6e2cbd0e44016a19373ad10bb5eb16020

    SHA512

    2db69c8507b0407713b6d2f638425bbd632c4493e5d4cf86352481f4a8efa8f954092f1efe5c47ba38afddec94a19dffec7e7ef5bc0d42b76a42ac463a47ce7a

  • memory/2180-29-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB