Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 10:05

General

  • Target

    a65bde36f9d84c8f244d913c30e82b0d_JaffaCakes118.exe

  • Size

    513KB

  • MD5

    a65bde36f9d84c8f244d913c30e82b0d

  • SHA1

    22b0372cb5d7e2a534d235870677af208b7829ef

  • SHA256

    0589f6889a04ed5dbbe794dc8e850749fa8398739e2912a8f370092202d3fa52

  • SHA512

    af25c67bdb928d45b39c0751eed8bafbfc50f6b5ee5ef38131904f8bcbad9541f04e04f31087bd3054fea6446f32b4c694d8f7862887c23fe3a8672d1d79626a

  • SSDEEP

    12288:ZO0crBSWN3aFAmeH2ZHYik3jm9scW8ZA9jYM:ZOzAY35lpgWH9

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65bde36f9d84c8f244d913c30e82b0d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a65bde36f9d84c8f244d913c30e82b0d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Windows\SysWOW64\rundll2000.exe
      "C:\Windows\system32\rundll2000.exe" "C:\Windows\system32\wbem\lhpzb.dll",Export @install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3832
    • C:\Windows\SysWOW64\rundll2000.exe
      "C:\Windows\system32\rundll2000.exe" "C:\Windows\system32\wbem\lhpzb.dll",Export @start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3532
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\ygqcv.dll",ExportFunc 1001
      2⤵
      • Server Software Component: Terminal Services DLL
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:516
    • C:\Windows\bar.exe
      "C:\Windows\bar.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1144
  • C:\WINDOWS\SysWOW64\RUNDLL2000.EXE
    C:\WINDOWS\SysWOW64\RUNDLL2000.EXE C:\WINDOWS\SYSTEM32\WBEM\LHPZB.DLL,Export 1087
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\superutilbar\superutilbar.dll

    Filesize

    225KB

    MD5

    70bd8878156db1490145bdebe88e349a

    SHA1

    51533c4d229f4667fd36616cc29dc3549a7a14c9

    SHA256

    37531889177a599fe9546d12a93209039e051c92adc5e22fabbfb792010a0f14

    SHA512

    44eae7748715f7c047a05ae2962900cf74aebbc0ce5b78a8db9d1c7a82412bd842011372f9f58d8c02751160a331a1643a4e026e81c12778efe0a72cae735340

  • C:\WINDOWS\SysWOW64\WBEM\ocmor.dll

    Filesize

    6KB

    MD5

    2c9c3948edbbdb7015054eda23d1cca0

    SHA1

    14a6aa1d75dfdfc2fd213545f150c034b0f7286f

    SHA256

    b75790e97df65e074970d9347148d60860328b91c6e0be08deacdc204b076fea

    SHA512

    75c70cb432107b43e20f6df8dc9484deb60d0a4dd2bf7182686a56bc533aaf44862015f40a62d867224502a5a505611b4d90b5638cf86721fcca378098fa9e9b

  • C:\Windows\SysWOW64\rundll2000.exe

    Filesize

    10KB

    MD5

    4936a6954ed59700a3c706f9094685ee

    SHA1

    124edd171bfc8a5c7f5fcf2147f6ff43b705bb79

    SHA256

    e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe

    SHA512

    1ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea

  • C:\Windows\SysWOW64\wbem\lhpzb.dll

    Filesize

    212KB

    MD5

    f818461f1c77a129a381d0e41364b462

    SHA1

    3921bf63a956d3af71e9ee5803ad84839546379c

    SHA256

    98dd83dc7fe47cbf9bb4afe0bf216dae0dabbc64e81b4108ac5e6846c1577a76

    SHA512

    75d93b83080068f0801f48969bf0179bf8a02b4f9bc037d1c3c82a3deeff8498e744cc220d6f606ceb83fd22a8ed4fc2ca5f68b9fc209196c23dddef4d53e3c7

  • C:\Windows\SysWOW64\ygqcv.dll

    Filesize

    234KB

    MD5

    de306418b972f8b45466478a3c0a5cba

    SHA1

    cae00b0088ee48e332fbcaef7cc5e3a234936248

    SHA256

    8f7ff96b97836082c165cf7cd933fdb7bd87fb1c1f76740e9cf562633da69460

    SHA512

    d503ff66f9a54c894934f2e44d99d9590bb35de3cd49c7477a3e09e84ec5b48dc7dbc86b0a957afc37a2548a0cce9ee2102d19856ffa113015605f37e29741c3

  • C:\Windows\bar.exe

    Filesize

    272KB

    MD5

    3c103af2fc889d3dae65e1cd335e1144

    SHA1

    9b36cecf2d2731e617cb621c3e4dbd977d7fc209

    SHA256

    9ce2504516ebd4653b9139d3828b93ace39d3530f1f22c4b166d04f11c2903af

    SHA512

    763e49e23e8b43ac6d6ec68e83f9a72ad144b446b1f60c3d7fd80aeac9d3340bb80815b7feb38b3076fd2a525176fe56602377891837f9e0b932cb8bf83c33d9

  • memory/452-49-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/1144-45-0x0000000010000000-0x00000000100C5000-memory.dmp

    Filesize

    788KB

  • memory/3532-23-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3832-14-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3832-10-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/4936-39-0x0000000000400000-0x00000000004805C0-memory.dmp

    Filesize

    513KB

  • memory/4936-28-0x0000000000400000-0x00000000004805C0-memory.dmp

    Filesize

    513KB