Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 22:16

General

  • Target

    94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    94f43772a6e9b5ba903830d941c829b1

  • SHA1

    1fbcbe170639bd25d6c408692aa039b81530b804

  • SHA256

    83d9d45edb2a88ff1ee264ab7270ca12ce06c806a6a68ea13d9b0396673a56fb

  • SHA512

    d5703d806ac4b096c2a87b13d1896a34b78048d4337725e1961ed113c238961e09b9c9da3d24ccc6f8b4d139d0cb88345d0cb18b5e00ef1db6729edc6f143049

  • SSDEEP

    49152:VuVsMMhKLl7SA6GLpjIBVw2sxl6HIKL/lO/NF1khpo3xPgWYmSowzjCLpwzBQTAw:+bs8pjI4/2w//1kU3xIXkit5JO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 28 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
        "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2204
  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe
    C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe
      "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini

    Filesize

    27KB

    MD5

    62d5f9827d867eb3e4ab9e6b338348a1

    SHA1

    828e72f9c845b1c0865badaef40d63fb36447293

    SHA256

    5214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5

    SHA512

    b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuser.dll

    Filesize

    172KB

    MD5

    377765fd4de3912c0f814ee9f182feda

    SHA1

    a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1

    SHA256

    8efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb

    SHA512

    31befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710

  • C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll

    Filesize

    220KB

    MD5

    b2f7e6dc7e4aae3147fbfc74a2ddb365

    SHA1

    716301112706e93f85977d79f0e8f18f17fb32a7

    SHA256

    4f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1

    SHA512

    e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83

  • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\IKernel.ex_

    Filesize

    338KB

    MD5

    93b63f516482715a784bbec3a0bf5f3a

    SHA1

    2478feca446576c33e96e708256d4c6c33e3fa68

    SHA256

    fbf95719b956b548b947436e29feb18bb884e01f75ae31b05c030ebd76605249

    SHA512

    2c8f29dda748e21231ab8c30c7a57735104b786120bb392eb1c20a320f2dddde392d136fd0c70853bb9af851bbe47df2955d8f9d5973b64870ac90bd12d2dd70

  • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\data1.cab

    Filesize

    423KB

    MD5

    2ac967473f9c189af9864e5126ee6b7e

    SHA1

    bf73a96c48334de74c0cc257c822ed858aada2db

    SHA256

    0e22ff520fd1b2f6e6d3a65b95bf0b350e1687c594854d2ff49d568515dfd25e

    SHA512

    4f083e9237f5c23dd289c577ea4d9e8ac5ecb90303f598678e60f4c9bc35add5e9be86de9265d7b43157b379122891d105117433e94bfd13f2675253e5fdd18f

  • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\layout.bin

    Filesize

    444B

    MD5

    ade3ff3e38c363cdb39bf4bd025ac05e

    SHA1

    c8334ff250bb1c5dfcb4ff79ea842849741804e9

    SHA256

    87f482c4988e40ee0124fefadccfd5655188f3aea061beb5d93b285b8725bfd8

    SHA512

    40e0f66a17817928b906b2b7dead63fb4cc1fd00f903dbb475ed9bb55897c647383817112ea559029f5e42a6d866e796d450e24e94d11a0fbe76d4be45ca9f2b

  • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\setup.ini

    Filesize

    82B

    MD5

    9a33760271da0e5277e4413cb25fa02e

    SHA1

    4ac67428a3f33eb871f0fc3a25777e66110f8e51

    SHA256

    b81389f61707291badbc8e00fbbbc5d473bb1895352fee89e4a88af258ba78b3

    SHA512

    33e4e8364445a1a645f3deb603f77775339692d39a0304853ef10355150cc6914296b79ecfcec20310d6e2dbe08fce15df93b646d3b819802330d49d3501b62e

  • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\setup.inx

    Filesize

    135KB

    MD5

    1bebfe9d6d8e5ecba071fedd6b6a629b

    SHA1

    c9a6b7dbfd8a46062b85c866fe6e7dd5256a9663

    SHA256

    edeab5555ead1dcff5f339d3ffc3cf84a7da9c581307c7298a288ce87ca02981

    SHA512

    3d07d163515745872c74555717175dfe34fa0cca227486c1fe5a47382950ab4f1d496a06a235ed01b1e24752ea7f783bd8a31ba0d9cb58744a0a949a9c53130f

  • C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\pftw1.pkg

    Filesize

    2.9MB

    MD5

    df0bc03ce04478c18968fc36fec7aeb2

    SHA1

    e0075ae4237613ded9d081f063acdfdb43a2662c

    SHA256

    7c41a967ff6d070d690815614d9a017b68ae8a958ff204d087af86a1317dd35c

    SHA512

    923984fbe44b9159aeffcda6ce6cf744cfa6a5cb035e66cbd9ef4db67ffc6da8afdcd093a6ab5032dc66686a4f4fb2c64e40ab8437fb418203af9e8850c7592d

  • C:\Users\Admin\AppData\Local\Temp\plf19F6.tmp

    Filesize

    3KB

    MD5

    487e6047b73aaf627cb042c2ca3d0d71

    SHA1

    bfd2b9e9d65a92e5c3bd172a34846602b4fdd134

    SHA256

    2c724778570a1c3a7391ec672e5b21c30ddf0d5369c89e3d6f2e164735c60159

    SHA512

    3a06c2466ef745a525aebcd8f17971637d497275728f85b51d8acaa4238955c4b70b6c2d1b807b1c84cc12e0fb580454c06a0d8d7855cbae872096822b13834b

  • \??\c:\users\admin\appdata\local\temp\pft1a18~tmp\disk1\data1.hdr

    Filesize

    10KB

    MD5

    f266052a4452c36e507383d150fe6146

    SHA1

    84badb1c8bffe517ddda3065b0e22b1528ad7a24

    SHA256

    2bff3e76aa29b08d8e1299365479ca3324012ca0306d2e253f66dd758ff2ba71

    SHA512

    d759fb034b64ce29dcf0491f55d0bec25c0d09fd9b3483536630e75bd1c93d468545974d9ed81dffcd1593a9e67be4fbeaa55e262994ec74c4d509756903f0e2

  • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctor.dll

    Filesize

    76KB

    MD5

    003a6c011aac993bcde8c860988ce49b

    SHA1

    6d39d650dfa5ded45c4e0cb17b986893061104a7

    SHA256

    590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a

    SHA512

    032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7

  • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objectps.dll

    Filesize

    32KB

    MD5

    8f02b204853939f8aefe6b07b283be9a

    SHA1

    c161b9374e67d5fa3066ea03fc861cc0023eb3cc

    SHA256

    32c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998

    SHA512

    8df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59

  • \Users\Admin\AppData\Local\Temp\IEU1B20.tmp

    Filesize

    600KB

    MD5

    b3fd01873bd5fd163ab465779271c58f

    SHA1

    e1ff9981a09ab025d69ac891bfc931a776294d4d

    SHA256

    985eb55ecb750da812876b8569d5f1999a30a24bcc54f9bab4d3fc44dfedb931

    SHA512

    6674ab1d65da9892b7dd2fd37f300e087f58239262d44505b53379c676fd16da5443d2292aeaae01d3e6c40960b12f9cac651418c827d2a33c29a6cdf874be43

  • \Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\Setup.exe

    Filesize

    162KB

    MD5

    c63ed941cf9d3ddb78f2b8b7ea9f1eb8

    SHA1

    41c4c327debc03ccb1e623a3f76fba53883d27a9

    SHA256

    569b0cf5a4b6add514dca2bcc182b89dd3519e0d2d3c92ff720c6d7f2ec539bf

    SHA512

    cdd10dcba1759559c5ba8035b62d1f7b0e9c62596aa0caac9c8f7fd47baac0fee33873a9f19ffa33a0f0f33b202d28e22e4bc39cbc8a28576e67b343e1be72cd

  • \Users\Admin\AppData\Local\Temp\{19882676-e60d-49f5-b552-73d0b7089299}\_IsRes.dll

    Filesize

    180KB

    MD5

    8868ad87b2efec11c2c6a5ab26aa11a3

    SHA1

    29a3ccd0b34405827051d0a9803dab0cd6a28ec5

    SHA256

    9877fc7491b55259db364b644dd8b5a1ac589d0b187dc1e52041323e76abd465

    SHA512

    1bda6ffb775a56891fbc2c73ba7bbe93dffac64a29d72e096269f6993532458cb60c66be6dc5f44d643841c150b1dc13e17dd7b482400fec1d6ac66ad608f42f

  • \Users\Admin\AppData\Local\Temp\{19882676-e60d-49f5-b552-73d0b7089299}\isrt.dll

    Filesize

    316KB

    MD5

    7409fc23b1f3ee88b29677b8dc961068

    SHA1

    755842a4a8e095024d4d8e810870b672ffab266c

    SHA256

    b50d6e5f174c22af8daaf46f55eb87ecd1e155783f25cdb12b4ec3bbed077fb8

    SHA512

    ed5d3c44a1d030a07eed753676150cc0de78783ddb2b9c567853d508ab457f124abd23552c5ca637304ad6214126c1babd3f842cc7821d8141a29f1bb34de0e0

  • memory/2952-160-0x00000000008A0000-0x00000000008D8000-memory.dmp

    Filesize

    224KB

  • memory/2952-157-0x00000000003E0000-0x00000000003F3000-memory.dmp

    Filesize

    76KB

  • memory/2952-169-0x0000000000610000-0x000000000063C000-memory.dmp

    Filesize

    176KB

  • memory/2952-165-0x00000000035E0000-0x0000000003632000-memory.dmp

    Filesize

    328KB