Analysis

  • max time kernel
    134s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 05:51

General

  • Target

    8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe

  • Size

    747KB

  • MD5

    8d8f6e5bceb52116c8283ea72c37bb5f

  • SHA1

    b0131445b97bae8be12514f285fbac7220e51779

  • SHA256

    beb378f4a6d6a608df965976e4983b9a8bd1cf20075897aa42bec522385546ac

  • SHA512

    82cc9c7cfac617b0cbf67c54640c4b57c5760a2b7d17da9d271e7aff9352e1d7b2b0b84ddf4d86e33ddbbcc86002af1a916a1f358c3009f88c3ea9c81510536c

  • SSDEEP

    12288:W7F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:W7EGALzohzUy2NJvhjyR4kKJRi0+4

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files (x86)\Common Files\CiScv.exe
      "C:\Program Files (x86)\Common Files\CiScv.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2968
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\delus.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Common Files\CiScv.exe

          Filesize

          747KB

          MD5

          8d8f6e5bceb52116c8283ea72c37bb5f

          SHA1

          b0131445b97bae8be12514f285fbac7220e51779

          SHA256

          beb378f4a6d6a608df965976e4983b9a8bd1cf20075897aa42bec522385546ac

          SHA512

          82cc9c7cfac617b0cbf67c54640c4b57c5760a2b7d17da9d271e7aff9352e1d7b2b0b84ddf4d86e33ddbbcc86002af1a916a1f358c3009f88c3ea9c81510536c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          79e0bebc854deeec7b709e82796e907d

          SHA1

          56e5328fa1c0dd409dbd84e97d1d1a56087dcd75

          SHA256

          f5e73e328fd3a693ec324a159c26aeba93e42f2362f0c9ef1c1bde0963ec81aa

          SHA512

          d4db8e432e4bc0cabb84c323650e3e59a64fbc98d990e08664e4fdd3289dde9489090ae39028b4026416c60e8ca17c638280d70c6b635344a87d60544e3518ea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          903aa0d69d462ddc8eaf515c13ff637a

          SHA1

          b50a2ed4822d8cbc7ef52343a470e4391049c7bc

          SHA256

          96496d7780791eb4c7c2e6a829446b22101aa0b793298cfb3729a56423e687b6

          SHA512

          7d3417cfc7cbcf00f3c75b73b86dbfadc8c885a37906efb54cb6feb6306522cf0c8235f83693d8073de166cbf71c2914c8c6dc9458ae556330ad9c3dbca5e804

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5785e63228990203922da15da0676cb2

          SHA1

          df823413f36d48d38b746f20907c4ad27bba9eef

          SHA256

          58ad93c366c0972f8cc382a3bcc551a70c3c29a63595834e54b098d58e4bbabe

          SHA512

          4c5ecf62e647f417c2c6b3e30b7043f0e5522698278c0dbdcbcb9f97322999493743da071dfe7733ca7e5d56bcdeef38bd195d9b31ec26138308f24c06e65d2d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          833e382f54b1599ecf1f53991782139b

          SHA1

          85ce7a4a30e10ca81602e005c5cd604a809c0405

          SHA256

          9366eeb07fbeabba1d77f6391eaa2143ae6a6cbb741f8b98c16956c393bf1183

          SHA512

          f039f99f4e5c808e94b468b335070b7704e5f00599c0ce063304f9d1059efa90d8b6317546526d979a49834dcb4863528d25435a039e8c057cd52637e5f8cd6c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e577d698a017d4d393bfc9785a17bc29

          SHA1

          8c22957fdb0f5ae9c69d88e9e1db3cb7cb38db0b

          SHA256

          dc9bd811c0b6b16a3052a9b9a64116a023f60791d55251af3717cf56c09b0eeb

          SHA512

          e48ae7f46d3fea6bdb8013593e8aba841dfb6ceadf6124f85c44396a61a644575bc251fb05c2a7557e08556dda9bcab1a76a41abf9d942197e0373b671227d11

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7f85098f93ae229895538cbcc9c8a254

          SHA1

          e4c7656c91c2efddfeddb3ef6fe86b28ea4a6890

          SHA256

          2f9c67388ea89003fdc2c8320565d53f40d23d701d48c764fb8ca01ddbaa8bcb

          SHA512

          a9617936020ed726c9ef1d1c8e490a54d622a2800a12283bdfcc6db96f0b5d387ab21ac8c0dbcd86dfd3d878b8c9b1ac44a6508644f597f960bba89ab320e0a1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e429637ccc98bbfe091d876b7fc0f24b

          SHA1

          0f42533f3577123cbd674d9efe78037a20bb93d0

          SHA256

          f15d8dc882cd49b91ad728b9e176bd01f58223200d66739510613826bdf730e5

          SHA512

          11aea5f554124c8782f36403c214ba1cda3e6fefc6d885a6c36d155c82deae5a58312072a3b719f8f1ee1148abd9081c2af72b0a5171d02929ec1fdf61825d8d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c7c68f80087288f23c2b0a30e837acec

          SHA1

          aacde6442fa8091ee65dd0518e94b16e219f4dcb

          SHA256

          4b7422bf40658c0e6d3b822eb45e9df944f9577d072829115404b49fbc593566

          SHA512

          f7cfd156f72e45c267dcab0f710bd3f439ebe8c74b633c2a3bd1a317d4eb8319ce87e40cd6709b969e7e190f231c1deb3477f60a70976211a5677fbfb6a5bd28

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6a057c26c755370e99a3e3272002798e

          SHA1

          2e23815265af52d385b9bc8e616cb88a1ffcb6e4

          SHA256

          0460a0ef65639cb97a35b4bacbdf866a63b6bb734ed13103d9199b297860d0bd

          SHA512

          fc2cd6ad783dfd78835a1ae15c646049b05c0d46ae6e83d50235545dcf5a7bab471d53c4081686e7e828d4d1cd0e606bf4ad22df45748428b535a043940e45e7

        • C:\Users\Admin\AppData\Local\Temp\Cab55FD.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

          Filesize

          34KB

          MD5

          387cf1d2f17aff6967f3107773764513

          SHA1

          b971bcd44988bee744f8133acb032e07d9dcd1db

          SHA256

          74c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6

          SHA512

          19a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c

        • C:\Users\Admin\AppData\Local\Temp\Tar566F.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \??\c:\delus.bat

          Filesize

          230B

          MD5

          ea0c358e88150bae0bc8b10519433ec9

          SHA1

          b7d2f602c56493715a23fa7b64cdc50fc4e3e09e

          SHA256

          3ede335ccccbc045b8b65e4442636591969c66f2194a2849efd8d0b9a67fe530

          SHA512

          ea5c297c207df62ef0b5b3d8215d3eb13bee454c271ff9f1affa9520cda23dffc3e2c0f4201bad9bd912548db81f58b4dcf2403137e2e51ad9d41214202d5f12

        • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

          Filesize

          56KB

          MD5

          6649262561fba5d19f8b99dd251b5d02

          SHA1

          286e2ab6bc2220b3c9a83720c4c612623210e10f

          SHA256

          824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771

          SHA512

          688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef

        • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

          Filesize

          406KB

          MD5

          e79169d47394020f7c893abb840b61bb

          SHA1

          c5b9c2cbef3d5458b52ebb67461e84432673fb1b

          SHA256

          11c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc

          SHA512

          21ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a

        • memory/2684-55-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2684-56-0x0000000010000000-0x000000001012A000-memory.dmp

          Filesize

          1.2MB

        • memory/2684-18-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2684-26-0x0000000010000000-0x000000001012A000-memory.dmp

          Filesize

          1.2MB

        • memory/2684-31-0x00000000002B0000-0x00000000002D4000-memory.dmp

          Filesize

          144KB

        • memory/3000-3-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/3000-8-0x0000000010000000-0x000000001012A000-memory.dmp

          Filesize

          1.2MB

        • memory/3000-16-0x0000000000320000-0x0000000000362000-memory.dmp

          Filesize

          264KB

        • memory/3000-17-0x0000000000320000-0x0000000000362000-memory.dmp

          Filesize

          264KB

        • memory/3000-40-0x0000000010000000-0x000000001012A000-memory.dmp

          Filesize

          1.2MB

        • memory/3000-41-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB