Analysis

  • max time kernel
    130s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 07:44

General

  • Target

    a5f36f4bd449a249562398e766106df2_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    a5f36f4bd449a249562398e766106df2

  • SHA1

    8f325fd10787fee56651e085bd1c0c393c809663

  • SHA256

    d568c62e8c9f52e03c50b6309815d03f12dbbaba46b948acd769f10aa181070a

  • SHA512

    257ff325f06c886c5aaa4ab957d1125b4613cee0463b64463dd7fd1e1638296e6da5878915b8595b07c1385e458fb4b7ec5b384ccc8769e9ab07d43813414985

  • SSDEEP

    768:VLi0NnqrjIcGA+9H5MQO7BUdLOyOLm/Cb5vTOc74Hpyfogpty2uhNqFeTCL:ViHIcz+j0W2QA5v974JyZuC

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5f36f4bd449a249562398e766106df2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5f36f4bd449a249562398e766106df2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\ZAYUOZBIDUJF.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3184
    • C:\Users\Admin\AppData\Local\Temp\JambSalutary.exe
      "C:\Users\Admin\AppData\Local\Temp\JambSalutary.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1576
    • C:\Users\Admin\AppData\Local\Temp\JambSalutary.exe
      C:\Users\Admin\AppData\Local\Temp\JambSalutary.exe
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ImposeKnocker\ImposeImplicit.exe

    Filesize

    46KB

    MD5

    a5f36f4bd449a249562398e766106df2

    SHA1

    8f325fd10787fee56651e085bd1c0c393c809663

    SHA256

    d568c62e8c9f52e03c50b6309815d03f12dbbaba46b948acd769f10aa181070a

    SHA512

    257ff325f06c886c5aaa4ab957d1125b4613cee0463b64463dd7fd1e1638296e6da5878915b8595b07c1385e458fb4b7ec5b384ccc8769e9ab07d43813414985

  • C:\Users\Admin\AppData\Local\Temp\JambSalutary.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • C:\Windows\ZAYUOZBIDUJF.dll

    Filesize

    78KB

    MD5

    ace39935dcfff2855df95edca1d090bd

    SHA1

    3412e25590d85688488a3c9fd82722b6b39fe478

    SHA256

    f9b6eae623a7d235c70e022b587723e9003c26db88198f41ab8674768a1abcaa

    SHA512

    72d548107504ca55e41f7e10c5e7f41ba5e628fccaad342f80ab5792e4436d711a3994c46086bbe1210ee8d73c1187da8858a9f39c7e204f5e822c4a483ec4c4