Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 09:48

General

  • Target

    89e84d8c1561f27fdfe45d0e0400a922_JaffaCakes118.exe

  • Size

    271KB

  • MD5

    89e84d8c1561f27fdfe45d0e0400a922

  • SHA1

    10fa0346c2cd78ff4c87aaa19d4ffac42877d49a

  • SHA256

    2ca65cf0508045ba1ceb342313fb310ca3b2d94a412cab147302399fe82b9ecb

  • SHA512

    57e5f4a736d14766af7b9281d50c01af87314f3ae2776ae231911a85999cf1bde759334460adf644748015c19ba463de842b4eb05aec90cc373db60a914a95b9

  • SSDEEP

    6144:Tf8dyD21oCyWW9mGBoQqe9fhUeU/BqinBrMJ1yj9UPj:r7q5yWW97oHep2e0B7Br21IE

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 31 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89e84d8c1561f27fdfe45d0e0400a922_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89e84d8c1561f27fdfe45d0e0400a922_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Program Files\Common Files\Microsoft Shared\A_v_DVD.dll
      "C:\Program Files\Common Files\Microsoft Shared\A_v_DVD.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\new_84aaa.exe_C53458B13F644A16A92364FF28674E810693B94F.exe
        "C:\Users\Admin\AppData\Local\Temp\new_84aaa.exe_C53458B13F644A16A92364FF28674E810693B94F.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2960
    • C:\Program Files\Common Files\Microsoft Shared\services.exe
      "C:\Program Files\Common Files\Microsoft Shared\services.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2864
    • C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll
      "C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Program Files\Common Files\Microsoft Shared\services.exe
        "C:\Program Files\Common Files\Microsoft Shared\services.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2992
    • C:\Program Files\Common Files\Microsoft Shared\A_v_TT.dll
      "C:\Program Files\Common Files\Microsoft Shared\A_v_TT.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1908
  • C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll
    "C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Program Files\Common Files\Microsoft Shared\services.exe
      "C:\Program Files\Common Files\Microsoft Shared\services.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Common Files\Microsoft Shared\A_v_TT.dll

          Filesize

          47.7MB

          MD5

          224cbb038aca1d6afac95304a86306ce

          SHA1

          026fae8cced0746a4eae59c1bc61c7c1239e6338

          SHA256

          b90cfeac658e3b6bc4d740e9cbfa52d86c424b5a7cd86157064f82c9ac640953

          SHA512

          da43c9abef8d42184869ef058e89ae697393a28aff4eeffac05d788e421f1d5c871185ccdd8f08e9aa3ac244fc93f760db222bec8926930553648e92e750e8b5

        • \Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll

          Filesize

          47.7MB

          MD5

          8b7e8fe6c875f74fe5d48aabbe45ed3d

          SHA1

          fa816267b7ea28b1ef3e2c05a9371de160548e7b

          SHA256

          39e20031073685d4a0dceca03ec8da53caad73bcb92c5764a20f233b2dba0ece

          SHA512

          ec00b144a60558479c439078c8910437eb9f78d61f594845d22bdc564407100c7693da2a3c7dec48408246f48b14aa0870c61768934458c0680765addd110bfe

        • \Program Files\Common Files\Microsoft Shared\A_v_DVD.dll

          Filesize

          606KB

          MD5

          8e0ab3f78bea26a8790a45d631a34937

          SHA1

          3e235fd16527744b8a8a10af161ac94693725155

          SHA256

          efdaad7ec88bdf55d86af76973059166f297b39e0eae51eb73651a3b4aff5cae

          SHA512

          eb474ee96d441552dd76106cb048b8439af13fb511241f12c8f2cff7fbde2aeb9929bd381209d295f7469be99cfe34ca5a4841412a01cfdfe97335c98c8792aa

        • \Program Files\Common Files\Microsoft Shared\services.exe

          Filesize

          47.7MB

          MD5

          e267af715ccdc98bfc97347260fab341

          SHA1

          0cd975d4aac9d169cb0cacb21b140804366de534

          SHA256

          d609fbed2e9c94a53aa40de59eb1feb89f71e15800961f67c41dc59133eec61c

          SHA512

          fcf757c1d0957315ee19c9d862643a38d1b4cf04d2963a981bdb79f6a508bf8e2bb2d58f20c1a73ff20d1967559044c0f44deb222f2e7be746b1140eb54539b6

        • \Users\Admin\AppData\Local\Temp\new_84aaa.exe_C53458B13F644A16A92364FF28674E810693B94F.exe

          Filesize

          252KB

          MD5

          98a47a067a396d52c8f33cd82d1df5e4

          SHA1

          2c8e3743283615f6f54afd60806f5476d3e52f06

          SHA256

          cc6e0f9ea16b535ab144868ca0b0b0d41a4953326a3b2bb3bb68a263bb3da83c

          SHA512

          380b32900159deb9a3caad5522414a8d77613fe4b832a63717809efaba65606a4526a4e5e32309c2168e22ce231b1294ee8cb95e633f60f3733f642510ea1f15

        • memory/1076-147-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1076-77-0x0000000000020000-0x0000000000035000-memory.dmp

          Filesize

          84KB

        • memory/1076-137-0x0000000000250000-0x0000000000268000-memory.dmp

          Filesize

          96KB

        • memory/1076-100-0x0000000000250000-0x0000000000268000-memory.dmp

          Filesize

          96KB

        • memory/1076-136-0x0000000000250000-0x0000000000268000-memory.dmp

          Filesize

          96KB

        • memory/1076-134-0x0000000000020000-0x0000000000035000-memory.dmp

          Filesize

          84KB

        • memory/1076-135-0x0000000000020000-0x0000000000035000-memory.dmp

          Filesize

          84KB

        • memory/1076-131-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1076-80-0x0000000000020000-0x0000000000035000-memory.dmp

          Filesize

          84KB

        • memory/1076-79-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1076-101-0x0000000000250000-0x0000000000268000-memory.dmp

          Filesize

          96KB

        • memory/1076-76-0x0000000000020000-0x0000000000035000-memory.dmp

          Filesize

          84KB

        • memory/1908-124-0x0000000000020000-0x0000000000037000-memory.dmp

          Filesize

          92KB

        • memory/1908-152-0x0000000000020000-0x0000000000037000-memory.dmp

          Filesize

          92KB

        • memory/1908-118-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1908-126-0x0000000000020000-0x0000000000037000-memory.dmp

          Filesize

          92KB

        • memory/1908-125-0x0000000000020000-0x0000000000037000-memory.dmp

          Filesize

          92KB

        • memory/1908-151-0x0000000000020000-0x0000000000037000-memory.dmp

          Filesize

          92KB

        • memory/1908-123-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1908-153-0x0000000000020000-0x0000000000037000-memory.dmp

          Filesize

          92KB

        • memory/1908-150-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1984-104-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB

        • memory/1984-88-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB

        • memory/2164-105-0x0000000000270000-0x0000000000288000-memory.dmp

          Filesize

          96KB

        • memory/2164-128-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/2164-56-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/2164-2-0x0000000000230000-0x0000000000287000-memory.dmp

          Filesize

          348KB

        • memory/2164-8-0x0000000000380000-0x00000000003CE000-memory.dmp

          Filesize

          312KB

        • memory/2164-97-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/2164-75-0x0000000000270000-0x0000000000285000-memory.dmp

          Filesize

          84KB

        • memory/2164-116-0x0000000000270000-0x0000000000287000-memory.dmp

          Filesize

          92KB

        • memory/2164-36-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/2164-48-0x0000000000270000-0x0000000000288000-memory.dmp

          Filesize

          96KB

        • memory/2164-0-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/2164-41-0x0000000000270000-0x0000000000288000-memory.dmp

          Filesize

          96KB

        • memory/2164-78-0x0000000000270000-0x0000000000285000-memory.dmp

          Filesize

          84KB

        • memory/2164-117-0x0000000000270000-0x0000000000287000-memory.dmp

          Filesize

          92KB

        • memory/2224-138-0x0000000000390000-0x00000000003A8000-memory.dmp

          Filesize

          96KB

        • memory/2224-103-0x0000000000390000-0x00000000003A8000-memory.dmp

          Filesize

          96KB

        • memory/2224-102-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2332-10-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2332-15-0x0000000000270000-0x00000000002BE000-memory.dmp

          Filesize

          312KB

        • memory/2332-60-0x0000000000250000-0x0000000000252000-memory.dmp

          Filesize

          8KB

        • memory/2332-16-0x0000000000250000-0x0000000000252000-memory.dmp

          Filesize

          8KB

        • memory/2332-17-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2332-57-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2864-58-0x0000000000020000-0x0000000000038000-memory.dmp

          Filesize

          96KB

        • memory/2864-49-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB

        • memory/2864-59-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB

        • memory/2864-99-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB

        • memory/2960-27-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2960-33-0x00000000034A0000-0x00000000036A4000-memory.dmp

          Filesize

          2.0MB

        • memory/2960-34-0x00000000034A0000-0x00000000036A4000-memory.dmp

          Filesize

          2.0MB

        • memory/2992-96-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB

        • memory/2992-94-0x0000000000400000-0x0000000000417AAD-memory.dmp

          Filesize

          94KB