Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 09:12

General

  • Target

    858a11b0097df26c5721f4d15f997bff_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    858a11b0097df26c5721f4d15f997bff

  • SHA1

    71a0a7dc8dbf58ba72eaafbde003140ded893e0b

  • SHA256

    4d1f652eab422d52dfb60a5a8f928f99288d590452359e8494761de2387bc468

  • SHA512

    280a23c3fc1f7bc0e232f3e2f346f8ac651bbe8545051d475b4b0ef1e22d8273318555270e3ab7b37f22deb294c535e29febf1bc13e0a2a8984f599e98ffd9f1

  • SSDEEP

    768:+W5zBCTMjhS3Pxwfnb0/i96+C1PpRBnbcuyD7U:7MTMjhSZwfWi0PhpRBnouy8

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\858a11b0097df26c5721f4d15f997bff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\858a11b0097df26c5721f4d15f997bff_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Program Files (x86)\NetProject\sbmntr.exe
      "C:\Program Files (x86)\NetProject\sbmntr.exe"
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Program Files (x86)\NetProject\sbsm.exe
        "C:\Program Files (x86)\NetProject\sbsm.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\NetProject\sbmdl.dll

    Filesize

    10KB

    MD5

    c209d22d35f5687817b79a9e767b7a4f

    SHA1

    5f9193bf597dcfd84548a012b9d53791f24d2e1b

    SHA256

    5b32979194a4f62e6c188a6763b0b027cd168db1f84fb6939a7edeb43ac64e5e

    SHA512

    73fd6431bb65ffab91e9a06d8747198898f9e11e02f3342ba0d6afc28414f89372549ab727ca368b98289a61645ecd35e72e272ac704588a805faee53ad76ed3

  • C:\Program Files (x86)\NetProject\sbmntr.exe

    Filesize

    19KB

    MD5

    8245884d12ff9ff4502b3b21a3b8ded0

    SHA1

    a9f0c6f07a35d46f5e42e20a34d65649c353df89

    SHA256

    46b8290aa9efec051976ed64bc9749c8cd7aa1a5321a72f375f2cab49a9391f6

    SHA512

    f08a652e6342f7e2654bc4f56fc5ba3c5c60874520d4e17508234b28e8d36fa97d8369931f763840200ec7fdd466db70c31e32693f2278126b140ba9e334558b

  • C:\Program Files (x86)\NetProject\sbsm.exe

    Filesize

    5KB

    MD5

    71a0a391d84bef1434da89fafaaf8f70

    SHA1

    906ba7209af06159593ce8b3c3886652b57aa468

    SHA256

    79283937cdb0c680feb7e0b8ffcd1f66f8386ea852261a340da54d73b13d98ce

    SHA512

    b66336bcd1cf2c7a93ceeabdadc1a18ab13b08b1ce772f926ee8bf78008625ddd9292c47852ea2331369422118c41b6b3ca5a1583e47ba38f1d607384c79def0

  • memory/624-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/624-17-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3568-5-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3568-10-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/3568-18-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3568-20-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB