Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 05:13

General

  • Target

    a584d7f2f1852463e449b5450f782080_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    a584d7f2f1852463e449b5450f782080

  • SHA1

    94377a33b65218b5df9075ef892fae026aca3f9c

  • SHA256

    898e8d6a8d0dafe81052066c542892106d20148eabfaa9c84f0f80bcd3552ad6

  • SHA512

    8ab75570355d9c5188a27c151e38e8b035e8a40a753f2c15587b19008e71eb108a769cebd019a5a1b8b1b87bcbaf8036347f127fe745c46a517662767f652b67

  • SSDEEP

    768:q+drPtHk711IYpq23ZdFbNVFQL5lCCENafjORvKN97WK9OENRDamusc:qIW71ZqA3V6CafcvS7JJNRvusc

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a584d7f2f1852463e449b5450f782080_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a584d7f2f1852463e449b5450f782080_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Windows\system32\SystemHper.dll,Install
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2176
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" C:\Windows\system32\SystemHper.dll /s
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1848
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\259542701.BAT
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\259542701.BAT

    Filesize

    226B

    MD5

    e38805631a890ad9d675012ec58023d4

    SHA1

    bae0480674af28063aac9e15a2a994106da83f53

    SHA256

    bfa1a38b141c70f5387cb673bd054c7ec08bbc2d84d2b5c8d9887b1f3bebe0fa

    SHA512

    7187ac72dc7c0329b9cb5244b9139573b435bf56206e41904d3f48b984fa9a2445e4f73d8157073e7e62f924591f655397bf22cc55cce02b865cbf8c7842332c

  • C:\Windows\SysWOW64\SystemHper.dll

    Filesize

    64KB

    MD5

    72c7a0f16a62b1775b22d40cd93b9ddb

    SHA1

    b3a4d9b9da3b543460530ab3a571cb9bc8a70884

    SHA256

    e2465e6ada8a40fb1aba1f85f8d200bbadc91eb067c4a58a8429239ae92da768

    SHA512

    cd2dca8fde8e41733dc6852ad51128bd58ca05cac5a73f4c4ebbf434b3bf3f216e70a05d384459982688c4efb80a2858fb8cbb1a95be36ab878ce6ad2e7018d8

  • memory/2240-0-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB