Analysis

  • max time kernel
    142s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 04:55

General

  • Target

    a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe

  • Size

    398KB

  • MD5

    a9abd03899f9d0d30033a99d60d25aa3

  • SHA1

    2400a2ece5fc5b69a95f232f5bf72d23492d4923

  • SHA256

    b1d58ec9e1339af39852ad1d9af8eef47abf7e92d07bb0b86b9ead3118d0821e

  • SHA512

    41c1413be4b712008b074077d3e31cce74da613f7c7e28a21fcc62f856a5e3ee2b8078cbfe253d635ad703ef669b9c0146a4c099e96a2a33fecc41ca0323b058

  • SSDEEP

    12288:2C8j5LHNmRG4Pn8FE+Kqz/vR3FvK0mzlt:Z8FbQ/8FEcz/HKXv

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Public\Downloads\Norton\{N360P_prod_1.19_4.1.0.32}\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe
      C:\Users\Public\Downloads\Norton\{N360P_prod_1.19_4.1.0.32}\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe /r
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2656

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\LC.INI

          Filesize

          157B

          MD5

          21974872e49086fb62d9c2ab95993916

          SHA1

          317041d12cde82d5ec6fd57b4a007124dc95d924

          SHA256

          580b730db5baf0a4b2c4a2729b092f33884793b2cc9094f644c0b24f60d93e0a

          SHA512

          8275d3e10ef4a1769b7a7b799be094a2af70bbc71c5fd91265a7fce45b8234d2f01700f5d6620ac4c0b4e7ad2952508684533ba57442af14637f8004baa81b3f

        • C:\Users\Admin\AppData\Local\Temp\Cab94B3.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar9533.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2212144002-1172735686-1556890956-1000\4bd07e1ba952c6aa9bf83a8d98c08949_5349ca0f-aec5-405f-83e0-aa034653cb76

          Filesize

          54B

          MD5

          9499c2f308410e48386f58ca7afccd2e

          SHA1

          e2ef9dec757aec938d801dd720fddc0c387da7af

          SHA256

          87e4fc1f82d5a89c7f10ca58cf5de66d184cc3ce02954a13ade3100414a3bc97

          SHA512

          ff68637e2b3b62cf6ca812bf4d067606edacb353825628048396c45e9be8ca7725c93787b8bcf82e610cf795f69a52b20d4ac48ade5405b114643af6515cf457

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Norton\Norton Download Manager.lnk

          Filesize

          1KB

          MD5

          1ddbf95a91d490adefa9bb8b654d400a

          SHA1

          97895b24f79331b9aae4966cec824874722f8ed9

          SHA256

          2461a67f518e24a414a75afb3ba4f40a000d0b9a074f542f225dde8f2a271b8d

          SHA512

          534458b3648eb5397fdd2df1cc4b9687287daf14efeeabf78f387b63de23a93f2d7d177e6f0b0ccf5a814ff5d826452d720032898a07f33f148e5161a6327a36

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Norton\Norton Installation Files.lnk

          Filesize

          1KB

          MD5

          47b26683bf5f1046f63be008e0599bb6

          SHA1

          4061b1591c680f5092fdfdd2da9562cd71c8555b

          SHA256

          1ad59b0cbc57e3e857bdca29921f56bf30921d948b7fd3b20605c7046f9de3ee

          SHA512

          b0a53e99962a75bcb1a1f689c126d7cff70020aab0e0911c37af3bc47b3a3f75be368d679fa6e26c88cf22fac632fd67ce7e2b5a9d711a77e230ea284fbe3fba

        • \Users\Public\Downloads\Norton\{N360P_prod_1.19_4.1.0.32}\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe

          Filesize

          398KB

          MD5

          a9abd03899f9d0d30033a99d60d25aa3

          SHA1

          2400a2ece5fc5b69a95f232f5bf72d23492d4923

          SHA256

          b1d58ec9e1339af39852ad1d9af8eef47abf7e92d07bb0b86b9ead3118d0821e

          SHA512

          41c1413be4b712008b074077d3e31cce74da613f7c7e28a21fcc62f856a5e3ee2b8078cbfe253d635ad703ef669b9c0146a4c099e96a2a33fecc41ca0323b058

        • memory/1908-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

          Filesize

          8KB

        • memory/1908-13-0x0000000001ED0000-0x0000000001EE0000-memory.dmp

          Filesize

          64KB

        • memory/1908-24-0x0000000000400000-0x000000000055C000-memory.dmp

          Filesize

          1.4MB

        • memory/1908-0-0x0000000000400000-0x000000000055C000-memory.dmp

          Filesize

          1.4MB

        • memory/2656-41-0x00000000008D0000-0x00000000008E0000-memory.dmp

          Filesize

          64KB

        • memory/2656-40-0x00000000008D0000-0x00000000008E0000-memory.dmp

          Filesize

          64KB

        • memory/2656-42-0x0000000000230000-0x0000000000232000-memory.dmp

          Filesize

          8KB

        • memory/2656-43-0x0000000000400000-0x000000000055C000-memory.dmp

          Filesize

          1.4MB

        • memory/2656-44-0x0000000000400000-0x000000000055C000-memory.dmp

          Filesize

          1.4MB

        • memory/2656-52-0x00000000008D0000-0x00000000008E0000-memory.dmp

          Filesize

          64KB

        • memory/2656-53-0x00000000008D0000-0x00000000008E0000-memory.dmp

          Filesize

          64KB

        • memory/2656-26-0x0000000000230000-0x0000000000232000-memory.dmp

          Filesize

          8KB

        • memory/2656-25-0x0000000000400000-0x000000000055C000-memory.dmp

          Filesize

          1.4MB

        • memory/2656-91-0x0000000000400000-0x000000000055C000-memory.dmp

          Filesize

          1.4MB