Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 06:35

General

  • Target

    a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    a9f6e78e77a235a05c20244aa25d2479

  • SHA1

    83cc54f729a3d1d411f10ffe9c6e81cb93878745

  • SHA256

    edc6e5d94a0db1e256be267292b4f7b97ff4cdb638e34b78520d66a2e2c51725

  • SHA512

    f0b0a8e1a8992136d3fa6a009f0429ff78f460f2b11edd8f8c0d4667891d6f92e67bad5f0f275aed1ca2fc8a5dc4b9909e3421f78cf008aedf599680ff34b360

  • SSDEEP

    3072:dVFKR3q9DeyMfSyA7YlA80kWFdHkOBv+/4H+XFjXt2w6oO5hhBcy:5K//PZB0kWDEMv+/QQFx2wVOvhS

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 60 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\280A.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\altcmd\altcmd32.dll

    Filesize

    180KB

    MD5

    68efb842c652233d902e7c3c20439baa

    SHA1

    f8c99518f9ad1a0126825fb1980d49d0dc703f12

    SHA256

    80e4d4999ed243273827d6852c4502d106e818e5109665307aef26d4e18b22ae

    SHA512

    4d908adbccc31432edfc5eddad29a9566d85b77c68df3f00adf7c960951b0552d569e0c5ae6586dc92b08c982a87100e0cbf9edb92354ca5b165395e7501b377

  • C:\Users\Admin\AppData\Local\Temp\280A.bat

    Filesize

    259B

    MD5

    7c3d7c0e457788d19a2823e7fb59182e

    SHA1

    cc4a75fa27644f203a2508d286dd3d64508d955f

    SHA256

    1f397297947bf297da8b3e5b5d3dd15aa2deb08055f37976c7291589cd1a198c

    SHA512

    fbed78457021fda05ca746e1246ed996e273666981512787671e362322f09fc2647ba40f86a52373fe11c13a667060fa1b2722d23c3b42c020545434fe13d91d

  • memory/2844-17-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB