Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 18:19

General

  • Target

    a39de7c2c76a25bb71d476c52726fe0c_JaffaCakes118.exe

  • Size

    500KB

  • MD5

    a39de7c2c76a25bb71d476c52726fe0c

  • SHA1

    7e059f0b77f0810235f9b3e8e8c8906df61c6b21

  • SHA256

    c8b8f23864a911f99f2c1fc9ff9ef7e27d8d8b0a9055e606fd9fa62bb0b159f5

  • SHA512

    55099e01c28d70b8626375ce23ff2bfcf007664e1eede1482e0eb0325c54cdb3a876870ea6d980c7f6a98b97c59db45644ffc06a9b5766061bde536d5a1ace4a

  • SSDEEP

    12288:orx3/N1Kj/eszEgLUr7NwmjsKe5ewIZ3y2B9s6:o9310zeUmwm0eni69

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a39de7c2c76a25bb71d476c52726fe0c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a39de7c2c76a25bb71d476c52726fe0c_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\70l8.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4956
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\03ca.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2720
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\da3r.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2968
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8ado.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2584
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8ado.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:652
    • C:\Windows\SysWOW64\aaad.exe
      C:\Windows\system32\aaad.exe -i
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4984
    • C:\Windows\SysWOW64\aaad.exe
      C:\Windows\system32\aaad.exe -s
      2⤵
      • Executes dropped EXE
      PID:4884
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32 C:\Windows\system32\830e.dll, Always
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2860
  • C:\Windows\SysWOW64\aaad.exe
    C:\Windows\SysWOW64\aaad.exe
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32 C:\Windows\system32\830e.dll,Always
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

    Filesize

    220KB

    MD5

    0b422cf9c08b39a046ddeb7193c4be0c

    SHA1

    0c6e280bf70866548431bd7d55598ce95d581952

    SHA256

    602704f54c027087a8e8d8c74fad2448bc8ce064c547a0367a8d52b38e4ee4dc

    SHA512

    7ec417e02682bc3610262403fe1d66474deaecc924849832ec55090f7f80b57445cb2c0caa1a0a33eec6ef5e1d8bc2c024f61b55926bd0fd2b1ccd7790db4706

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

    Filesize

    600KB

    MD5

    a81aeb122db6cd0a2ae7495c1381a461

    SHA1

    a43fb28ac482edde23696d34ded08b38afd741a3

    SHA256

    ff05b22600b1d1135cc0cdf51c9f744695acc832d3371c22107941b5be94f753

    SHA512

    7d8e1469d3fc99e05db1317fb4baa8ab3d2ceaca4d4ebff482f76b5d1145d8b5d61a69c067dc435ae0f7c0e7e999de88d9c2b7134a641728790d7f7b62bf350f

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe

    Filesize

    148KB

    MD5

    3c6bcbd771c39e6fdf686c819cde5258

    SHA1

    34a36dc1d66b02274fbc080f2da407557e0724f5

    SHA256

    1c842e2d37e9870e1bff3679093779561c8af17582bcba56a35725505d871a7e

    SHA512

    3e9c5e4862e75226bf6fcd7ecdd1c02090fafbada342fb72b37b5b3539a11b561c3ca35acdfac274cba4613109e5297a6cba6b0e64a0623d0e02a77a23449a89