Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 19:28

General

  • Target

    8ba9d5a3628a64034dc4e3d2ef06c428_JaffaCakes118.exe

  • Size

    572KB

  • MD5

    8ba9d5a3628a64034dc4e3d2ef06c428

  • SHA1

    e4985b0e346fa11d11e9a520a300f890fbed81a6

  • SHA256

    ca011c7f7084d951d24e2d8f21a4688425429695f339c01b6f0431027cd01a1b

  • SHA512

    b7de8ebf23848e3cb94f51e3d7f4984c54efd5a93092f870efd070f4021bd09563518103b8b7664fbc07909de646028b72a9fa2f756052749164efb50535573f

  • SSDEEP

    12288:Bc1WrtOLqz3/pWOxT7D0FftJ4DzcB3NCFNch+gF++P4PnQjA/Fp9WM:2grtea/pZNDyt+DCNCLM+wUQu9r

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ba9d5a3628a64034dc4e3d2ef06c428_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ba9d5a3628a64034dc4e3d2ef06c428_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\SysWOW64\rundllfromwin2000.exe
      "C:\Windows\system32\rundllfromwin2000.exe" "C:\Windows\system32\wbem\ydzxg.dll",Export @install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2960
    • C:\Windows\SysWOW64\rundllfromwin2000.exe
      "C:\Windows\system32\rundllfromwin2000.exe" "C:\Windows\system32\wbem\ydzxg.dll",Export @start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2564
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\ozezt.dll",ExportFunc 1001
      2⤵
      • Server Software Component: Terminal Services DLL
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2608
    • C:\Windows\toolsp.exe
      "C:\Windows\toolsp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2496
  • C:\Windows\SysWOW64\RUNDLL32.EXE
    C:\Windows\SysWOW64\RUNDLL32.EXE C:\WINDOWS\SYSTEM32\WBEM\YDZXG.DLL,Export 1087
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ozezt.dll

    Filesize

    211KB

    MD5

    ea54217583c9176cf089c3c2f432671b

    SHA1

    b05a3d97ea517ba38d0c5a024dfb5c5f1421bf60

    SHA256

    dec3c480dc07306058c124729297da6a859243ea64767d710685ee731250f4c4

    SHA512

    4eb49a61bb35e14edbbec37a9fafc98b044c5f1386dd5742f405ab0de922fccb53ddbd0a3e4201157a75d93d2830486cd08dd363e3290e8562beb5d1fd2a0f98

  • C:\Windows\SysWOW64\wbem\ydzxg.dll

    Filesize

    296KB

    MD5

    2534e95e3e2e158a48a908c83c8290a7

    SHA1

    fe80081fcf8941f7ae25c488acb85e6a2b8c5684

    SHA256

    e64f5d5e6a0d9a2ccf3e20fcec8c559e52c99421b1c1a9392e3237869e985952

    SHA512

    b35dc83c0e331d8a6fb5ba56a131d3d14d3b88b56dd23e0981a149a02506211fdd13dd7ebe3ad1f5828f89dca775e42e21b5e515074b97491d66ad0b4c90402d

  • C:\Windows\toolsp.exe

    Filesize

    311KB

    MD5

    7502638d9ca22027488b02b024f5d42f

    SHA1

    efd5abb39571f86726f323df786037d0401d08e6

    SHA256

    688e2f49a2a2b5828fafc392f953441c9d7612fcf6a2a9a68e0c590fa8787564

    SHA512

    368ef2460f4f459307f3f325f9829bea5a95ba99d3afbc245bf8e066cc898db596a5bdf0f89d357bb77b6d797efd25ae1e91b7f1b390b4ac56e7d265ca8b5332

  • \Program Files (x86)\superutilbar\superutilbar.dll

    Filesize

    752KB

    MD5

    b677b0a8ab09a046f566f37e9f2fa798

    SHA1

    2f954b545d49b4e05d5f8a4f5ed4355435a59fa9

    SHA256

    0400a864a79f730340ba2e26a0fd2d2f2222d79b24636ba56554d8682c949c23

    SHA512

    86ae9c7118d4d14332a3bac85d411d0228b7150464e7379e9c0d9223878466f5a597b26deb390596f7882e46664ab189bed74439280f756c2214b13f53bb7ebf

  • \Windows\SysWOW64\rundllfromwin2000.exe

    Filesize

    10KB

    MD5

    4936a6954ed59700a3c706f9094685ee

    SHA1

    124edd171bfc8a5c7f5fcf2147f6ff43b705bb79

    SHA256

    e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe

    SHA512

    1ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea

  • memory/2564-29-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2564-43-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2960-18-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2960-20-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3004-15-0x0000000000230000-0x0000000000234000-memory.dmp

    Filesize

    16KB

  • memory/3004-14-0x0000000000230000-0x0000000000234000-memory.dmp

    Filesize

    16KB

  • memory/3004-28-0x0000000000230000-0x0000000000234000-memory.dmp

    Filesize

    16KB