Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 16:09

General

  • Target

    93cdadcc600a9c71af6a9cfe42f922da_JaffaCakes118.exe

  • Size

    668KB

  • MD5

    93cdadcc600a9c71af6a9cfe42f922da

  • SHA1

    1da90aeac5f045dfdcb83a3052227915d8dd8a87

  • SHA256

    a92de038269e83be5f2fbd778f27d396916dc26efaac325d4ddf3c649b2493c3

  • SHA512

    63d293d95bb1a9ef6ca36d6a0d70fffa190d727422bd918c6fb7bbc52c1f0b805c8fffb358cd0f74ad7ad2a09cbea60f8054977c0d6c95eb78ea7bf7a054a418

  • SSDEEP

    12288:90/T74fB5YGX41MfXn90OmWgVIvtEtxsUpCZifJfB0YwjtN:W/T7Y5+MfX6WgxQuWe9BKj

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies registry class 45 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93cdadcc600a9c71af6a9cfe42f922da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\93cdadcc600a9c71af6a9cfe42f922da_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\Update.exe
      C:\Users\Admin\AppData\Local\Temp\Update.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\Common Files\system\direct32res.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\system\direct32res.dll

    Filesize

    139KB

    MD5

    d24d52d9bf629e1029c9219c26c93350

    SHA1

    8c6c5f8c32408b9807b0d16cd76709a393ac56f8

    SHA256

    b4ac66370305f2ad453fce9b34c2ce3e88010151b843d578b6eb51519fd463cd

    SHA512

    3db217730f50d291345dc1cb4e761721054b2a924b0c54b808aac87c154858fbfd843f891ec924350b474928ca6769c32ce8fa5493e1565676ce74ce54162599

  • \Users\Admin\AppData\Local\Temp\Update.exe

    Filesize

    171KB

    MD5

    805c26bc39f68d78c52074e40e519140

    SHA1

    a9b44c432bc59f04974642aaa20eb0b1d23ba58c

    SHA256

    771eca87e288cdde72b4ff1bc8aff033a6cc4533419374307d9e005500a1e230

    SHA512

    6d8d488bf2efb614db43fa1962f417afc373906105a23f065105e62ab09d821271a91476d3677ecdbf37b98a3e0e5d2a354b10b0dac9d87e86f8c4fc5710474c

  • memory/1476-2-0x0000000002C10000-0x00000000036CA000-memory.dmp

    Filesize

    10.7MB

  • memory/1476-17-0x0000000004DC0000-0x0000000005E22000-memory.dmp

    Filesize

    16.4MB