Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 20:40

General

  • Target

    94a5ff705624aff62608105f77126b08_JaffaCakes118.exe

  • Size

    123KB

  • MD5

    94a5ff705624aff62608105f77126b08

  • SHA1

    5d35d8f7fbefa06b4d4cd3481389533c9fbed4bc

  • SHA256

    45b50ff43794a672a545244455d2d9af9edb1584b98e3545dd60a6273591eb0e

  • SHA512

    bdc3a80d87e8f57f903fc33948e402913bc2a72253a14bc2661622302882377e1f3533d34041cb706c0a579838584fe7c5e83a0bd92bdd15ae7ec5dce9d55a07

  • SSDEEP

    3072:ueSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLPUvFjGob:uVYrJrOSsRwcpRSjG2

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 2 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 4 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94a5ff705624aff62608105f77126b08_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94a5ff705624aff62608105f77126b08_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\iaccess32.exe
      C:\Windows\iaccess32.exe
      2⤵
      • Manipulates Digital Signatures
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\tmlpcert2007
        3⤵
        • Manipulates Digital Signatures
        • System Location Discovery: System Language Discovery
        • Runs regedit.exe
        PID:1812
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Windows\system32\egaccess4_1071.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Instant Access\Multi\20110120050117\dialerexe.ini

    Filesize

    668B

    MD5

    6f73ca8279d6ee3d38da7982e2109e93

    SHA1

    3ed8ff3e3918b59f959b0ec1ebb6930d9e3f8fec

    SHA256

    e1570eb2402f0e05215f24a5af0c9986e593067fcab5ea4c19d08e974548b1ed

    SHA512

    b5bb8189782542976700222b822b8d8bbd5ee62baddbd0b4bfc2460ca3ab3d477ea8fd38f56a8ab3a1347201f2b53a05c5c0ebb4bc66d12da5d48f2215a10873

  • C:\Users\Public\Desktop\NOCREDITCARD.lnk

    Filesize

    2KB

    MD5

    ef6ed257b86ddb5a211b910ad02e4421

    SHA1

    5fd2cccfad0e9939d62e10c4d2c351ee759a74c9

    SHA256

    a3022a2ea72fa52ba1aac45b1b9adb428964a51fb580952210a85ee8b41a7080

    SHA512

    939a783b6fb61703f91610e818e07de2f4ed2b4d20c56941fd3e2a6e7e519dc9a609dfb83cfdb38edf1724c2608294b46bb21968b1d5c9cd8e165dabe280f3c3

  • C:\Windows\SysWOW64\egaccess4_1071.dll

    Filesize

    76KB

    MD5

    b83f652ffa76451ae438954f89c02f62

    SHA1

    b3ba0014dd16cee5f6d4cfe7e28b2d5de79dc6dd

    SHA256

    f601991aa00cbe7001197affc0e3854ab76c51c05b9a6ca3e3f708fed876c32f

    SHA512

    965172a5ecd070ea6707ec9985ee3c135c06534561b90ae233e8049b247d87d529b8280f0faf2b0ed933f59c68844414726fa80c4d3119cffa4fdd1cb60eab83

  • C:\Windows\iaccess32.exe

    Filesize

    123KB

    MD5

    5790a83f61f4af9fd375c6edb3e4153a

    SHA1

    6ec75f191efd5f5a428b8cf084c7bbbd905ff248

    SHA256

    5d0508ffecf0cb035a7e06d7bb371b457f0643f3484b8e79abf5232fde4349df

    SHA512

    1efbcd081cd5df9d10ad5f9f6b89ee7e143ffda148e70fdc2616f3019210e3ca47fc5987953f8af15cb37a6956ded7f91e90e3fc1ae5653838f605a8e13b5360

  • C:\Windows\tmlpcert2007

    Filesize

    6KB

    MD5

    b103757bc3c714123b5efa26ff96a915

    SHA1

    991d6694c71736b59b9486339be44ae5e2b66fef

    SHA256

    eef8937445f24c2bcbe101419be42694e0e38628653a755ab29ecba357d81d48

    SHA512

    d04f2ab14ad4d3e06ea357b4c810515d73b32f2650533a5895ebf5d14b4b697752f25c0c371372e00faab661c0b051c33b8c25bf1226f30be5d6b8727dea81e1

  • memory/2040-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2040-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-79-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-83-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-56-0x0000000001E30000-0x0000000001E40000-memory.dmp

    Filesize

    64KB

  • memory/2536-77-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-78-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-80-0x0000000001E30000-0x0000000001E40000-memory.dmp

    Filesize

    64KB

  • memory/2536-81-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-82-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-44-0x0000000001E30000-0x0000000001E40000-memory.dmp

    Filesize

    64KB

  • memory/2536-85-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-86-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-87-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-88-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-89-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-90-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-91-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-92-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2536-93-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB