Analysis

  • max time kernel
    145s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 12:12

General

  • Target

    960d5c797298fbbe45eb9dd2fafade0d_JaffaCakes118.exe

  • Size

    655KB

  • MD5

    960d5c797298fbbe45eb9dd2fafade0d

  • SHA1

    1a34911fea08ca38a24a7b28a5c0531ef23659a8

  • SHA256

    e1f705a150f56a760af68e717f90cd553bf7eaba7861e7fe6596ba76d06b3f7f

  • SHA512

    6ae4da5d2eb692a9f1e5845458c160f9566322d5e3b21afd3765c60b6bcfbb3496b490b732db4501c881188b3f4ec06fdeb5ccf02a01cea4705b73e474c0a6dc

  • SSDEEP

    12288:8ZV4oaq2hwFKUanKHE2O4F/i0Mt/YLJa19G5HREoc5hJqM9W8nGa54dqDqu5clH:8r32hwFKHnj4qOLJa198IhJqms4DquaN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\960d5c797298fbbe45eb9dd2fafade0d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\960d5c797298fbbe45eb9dd2fafade0d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.exe
      "C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.exe" "C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.dll" cy2rh3496299266
      2⤵
      • Executes dropped EXE
      PID:2500
    • C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.exe
      "C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.exe" "C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.dll" xusicebud "" rerecorivis
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2372
  • C:\ProgramData\ZwankySearch\zwankysearch153.exe
    "C:\ProgramData\ZwankySearch\zwankysearch153.exe" "C:\Program Files (x86)\ZwankySearch\zwankysearch.dll" rerecorivis tosezufi
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files (x86)\ZwankySearch\zwankysearch.exe
      "C:\Program Files (x86)\ZwankySearch\zwankysearch.exe" "C:\Program Files (x86)\ZwankySearch\zwankysearch.dll" yicoriva ededetiziro
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\uninstall.exe

    Filesize

    83KB

    MD5

    71c085dade61786f05adc685d4f74b01

    SHA1

    8b58d09e5c47a14edf983277bfff8ea6db313d4c

    SHA256

    cd2ed594c06c16d66b534e6aaf76afb99c0dcbf77f4906ceba9c29495d300af2

    SHA512

    add86e11840a0a69b3e4ba51756e672f58b9f363436c2fd7fb8b549b7f1fae0198093980b8bf93a984a920eb37703cf9af3280e11e0907ae202a8bd441a7999e

  • C:\Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.dll

    Filesize

    564KB

    MD5

    372ce99ab45d93db61f233d32a168f6e

    SHA1

    764eefe6632198d6b4053b8dd54d3c12042787ef

    SHA256

    8672f7244fba688e01d511e48d8e85517cf0f440010dee31a51786d4a2e92509

    SHA512

    ab2e0a59260aef32140c72f3ab7da52779f6cc63772e2c4afc4e6d6dd65b6613c9d43bd55c5bbeec8d4de46f04e52e9d3b158af2552a56f9224c361968930803

  • \Users\Admin\AppData\Local\Temp\nsj9253.tmp\zwankysearch.exe

    Filesize

    48KB

    MD5

    ed758535ce8531f2d471d87e1798532b

    SHA1

    58c191bd4c41b19abb54a8b313381d657fd1a148

    SHA256

    2b3bc89f6c62446657fe762a1dfdf1feb40c73625f21d5829e5fef3808d78723

    SHA512

    95cd159bf798520a6d9bf67eb8f8ae142ee730b9706627962bb9a74cb0803c24d4decf6664bea4d81ba3c7cdd0589c38593bee7a87a4f25e3c9219a9e2c1b331

  • memory/2372-24-0x00000000002F0000-0x0000000000372000-memory.dmp

    Filesize

    520KB

  • memory/2900-56-0x0000000000220000-0x00000000002A2000-memory.dmp

    Filesize

    520KB

  • memory/2912-35-0x0000000000320000-0x00000000003A2000-memory.dmp

    Filesize

    520KB