Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 10:52

General

  • Target

    aab6e096de7fde4b02f60b0f93167ccf_JaffaCakes118.exe

  • Size

    663KB

  • MD5

    aab6e096de7fde4b02f60b0f93167ccf

  • SHA1

    91c648bd269e2c5554a223f1f755eea4db3dfc1a

  • SHA256

    b4dcf47d6651242b86d5f191422c6bec7afeca4efad79bd78095437921b17609

  • SHA512

    755f21d8542eed79f32c328edb21dbd3f7296e36c4f0f8101edbd439f9888dbdf33359415a25395698c2540300dd2acb51943e3151b589e12ec7d86726b9b314

  • SSDEEP

    12288:MJe0oVDdvW4dIy5Uzhqzzq+42QkutA3TgWRGo74X8wvbPAsxxM0k1/tkBOAojc/B:gRo84dIAUzhqzzqF2duC3TgloMX5vxxB

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 47 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs .reg file with regedit 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aab6e096de7fde4b02f60b0f93167ccf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aab6e096de7fde4b02f60b0f93167ccf_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\windows\web\printers\125.bat
      2⤵
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2616
      • \??\c:\windows\web\printers\rar.exe
        "c:\windows\web\printers\Rar.exe" e -y -ping c:\windows\web\printers\usbhard.rar c:\windows\web\printers\
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:3032
      • C:\Windows\SysWOW64\attrib.exe
        attrib +R +A +S +H c:\windows\web\printers
        3⤵
        • Sets file to hidden
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1088
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s c:\windows\web\printers\1.reg
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:1972
      • \??\c:\windows\web\printers\rar.exe
        "c:\windows\web\printers\Rar.exe" e -y -ping c:\windows\web\printers\zzz.rar c:\windows\dell\
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:2304
      • \??\c:\windows\dell\lsess.exe
        c:\windows\dell\lsess.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2576
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s c:\windows\web\printers\5.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2912
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s c:\windows\web\printers\2.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2696
      • C:\Windows\SysWOW64\attrib.exe
        attrib -H -R d:\~1
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2044
      • C:\Windows\SysWOW64\attrib.exe
        attrib +H +R d:\setprter
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:316
      • C:\Windows\SysWOW64\attrib.exe
        attrib -H -R e:\~1
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1244
      • C:\Windows\SysWOW64\attrib.exe
        attrib +H +R e:\setprter
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1148
      • C:\Windows\SysWOW64\attrib.exe
        attrib -H -R f:\~1
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1760
      • C:\Windows\SysWOW64\attrib.exe
        attrib +H +R f:\setprter
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2588
      • C:\Windows\SysWOW64\attrib.exe
        attrib -H -R g:\~1
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1600
      • C:\Windows\SysWOW64\attrib.exe
        attrib +H +R g:\setprter
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2796
      • C:\Windows\SysWOW64\attrib.exe
        attrib -H -R h:\~1
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:568
      • C:\Windows\SysWOW64\attrib.exe
        attrib +H +R h:\setprter
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:268
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\11a.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:532
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -H c:\ma.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\11a.bat

          Filesize

          240B

          MD5

          58ddc1529473db9b83ba9615c7e0f09e

          SHA1

          531adccf839664a85aa32bb541a22b1401ef65d2

          SHA256

          d940b48ebbfc66d8066e6038ea52f52339a6ab0b23cd9a5d86265900a70626d0

          SHA512

          2c000742f2b8415c28748c5efa7bc4bedb3756d906f9e3d6bd21bc329efb591d513cb025c7b89fc95b761b6173d4728122780c7e09bc9599559e5728a9218146

        • C:\Windows\Web\printers\125.bat

          Filesize

          1KB

          MD5

          1af018ff177dfbae562ac429cff786cb

          SHA1

          81f09865306d8c91d59bbec8a11ac874816f102c

          SHA256

          dda4aa27c7fd4b793bcadbd94c47dc997d66e293f910af3826de893b0381914a

          SHA512

          a76fba548576d2c99dac7e040bb140e29a68f55ee024174018345c4236e2a7ebda96d5ed1b66da85ae60d20485847e3cd38d34262be6c45475938f8d2182ab22

        • \??\c:\Windows\Web\printers\1.reg

          Filesize

          45KB

          MD5

          4ad724ba8346d8556e6e884727c0523e

          SHA1

          b53e2ec83b5b8441667b980fe6a53d69987fca89

          SHA256

          48c52c0934097cdd0aea155be18a2006f2dd6884d623a51b00baf3e5de3e1412

          SHA512

          fde2fb90a19fa00d040ade516fef8ca5f4463aee1a8af2fc85f41c3e818365086ff12491c330c8598bf071270bdbd863bbcdb5a5dde3d2523fbd1f6182eb33f3

        • \??\c:\Windows\Web\printers\5.reg

          Filesize

          22KB

          MD5

          3619b2192d1e0d4907f7d4702b4aa9e1

          SHA1

          1bb317bea13bb457d9ec71294e5c07c93cc9b8e6

          SHA256

          7da095327a1e11369d67d4f15d7c2e84cce9fb5d4cbac42d9b70bf0976300893

          SHA512

          8f2d8420dc2e92a4df42eab89bb612b2562ff6d152c4a6f651c64371089506673bf9f02a37ff1c3ad53a9ae0fe51aa9c47dcdb7e01a319df51306d58a601b7ff

        • \??\c:\windows\web\printers\360s.txt

          Filesize

          33.7MB

          MD5

          d3c91ba79104275b8fc182c6e32a7cff

          SHA1

          094069eacd5d0fb117a40e310beb2b4aa4590420

          SHA256

          ceae80f544d3ec3ab1211773c601f1ca6eb8319a9e62960bb1fe98ddfbfe0553

          SHA512

          99cc0918b6029b35dd3a7fbcf8dd50b34c05364e7c4045c5dab7b206f510a95ac428a2fd59137ae1b0279d016f6d6bf0440ae8e5a063b1c32594c070b91a1241

        • \??\c:\windows\web\printers\usbhard.rar

          Filesize

          236KB

          MD5

          a0f784ad499c07a7b7c3a48fab5afd0b

          SHA1

          8194f876410f89d3e4cc9ad1f86c89d1138b0d6c

          SHA256

          89c23b96ac3837d3ee68ff0684f57e14cee8fc3ac3171d65c173ba6417411335

          SHA512

          a13b015ec263073ddd2aa5ad116f65f7ae38dc592d6fba9ab2fc3dc034c483d53077c83005b9214cecbf8201a5cd50baea33824136903c0604c5cf6ade2f39de

        • \??\c:\windows\web\printers\zzz.rar

          Filesize

          265KB

          MD5

          b6e7488813588c9f2d86d3f0f956fd42

          SHA1

          a61ba89c5b6a5962611680199667bb682a761074

          SHA256

          1e5e17c81e354de2172d1ab9b62a356b82037e3d64efda7b968ed07bbafc9742

          SHA512

          d33ebe2070d979a73cdf54e60bb6fe06bbfa25e906ddfbacac827378131922f53873bbb10856293f327e878364b16aea5097c49a03d86d3511351aaa79121b69

        • \Windows\Web\printers\rar.exe

          Filesize

          310KB

          MD5

          0a5680183c0089a64621e211917664d8

          SHA1

          8525d73c99e28413e97a094c99950e1806786246

          SHA256

          c7d6bfe9d26d1ecdd9f2e7f3f892a4d32030949937f86938edcb1995655c2814

          SHA512

          b843b8994c764c3761bef8d34eefb312c9d9567b3f4aadc38008caf42d0cdb82c33276203e4210adcc1e8c567268ebdf01a0a1e839694811932889ac971bb051

        • memory/2208-1-0x0000000000020000-0x0000000000023000-memory.dmp

          Filesize

          12KB

        • memory/2208-78-0x0000000000400000-0x00000000004D7000-memory.dmp

          Filesize

          860KB

        • memory/2208-0-0x0000000000400000-0x00000000004D7000-memory.dmp

          Filesize

          860KB

        • memory/2304-66-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/2576-92-0x0000000000400000-0x00000000004FC000-memory.dmp

          Filesize

          1008KB

        • memory/2576-89-0x0000000000400000-0x00000000004FC000-memory.dmp

          Filesize

          1008KB

        • memory/2616-87-0x0000000002330000-0x000000000242C000-memory.dmp

          Filesize

          1008KB

        • memory/2616-86-0x0000000002330000-0x000000000242C000-memory.dmp

          Filesize

          1008KB

        • memory/2616-93-0x0000000002330000-0x000000000242C000-memory.dmp

          Filesize

          1008KB

        • memory/2616-94-0x0000000002330000-0x000000000242C000-memory.dmp

          Filesize

          1008KB

        • memory/3032-55-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB