Analysis

  • max time kernel
    143s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 12:58

General

  • Target

    b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    b38b434a32ef25b5c5cde70bef6a3be5

  • SHA1

    bf15f1585e8676fbfd3acd972ab522a8630311dc

  • SHA256

    3eeac00ea7f4165bcc97bfd2423980861587672def9679029b803e252aa65c4d

  • SHA512

    a6d9230b5de597034f6aac96dc1d0d2f9bbd03c7849306a2077e959528f8bd91df9703ce9156944fec38f4abf778676df694f60484a1db978027578b14146b1f

  • SSDEEP

    49152:dpToKhpUcKpn8xO9d021MYqD9BP/n3NHj:UKjUcKJBK21MZDXP/n9D

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\kb0.136.exe
      "C:\Users\Admin\AppData\Local\Temp\kb0.136.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 556
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2768
    • C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe
      "C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\is-8H8J1.tmp\is-5JRAS.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-8H8J1.tmp\is-5JRAS.tmp" /SL4 $60150 "C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe" 723322 50688
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe

          Filesize

          913KB

          MD5

          e09153f89a7fee92f24192d58a453254

          SHA1

          723406bb4841cb02794c611515664fd9abfe3f3b

          SHA256

          fcdbe26ad10ff3ee32984c16f3b72cfcf32fae4c028e66dd9450c403138a25a1

          SHA512

          5ce34fc091455881f5d693769c1ee9430d3a49659fc03491dd46adac3a803d963e0dee0c71743240c4429b5d189adeff29c56516f67b4874e005cecf95c26b18

        • \Users\Admin\AppData\Local\Temp\is-1V19F.tmp\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-8H8J1.tmp\is-5JRAS.tmp

          Filesize

          572KB

          MD5

          0d0622f7d2fd629455a028d7e1cb1c07

          SHA1

          82bdfc15f188241c535d7a42f0f95c99d0913bf4

          SHA256

          ab0982c120a65adc3aa898af09ad923c9b896edfc52f7d206798c5fdf59d8f5a

          SHA512

          eb5a930c1ba85b9cdb60a65fcead39592f7a1b87985d927580bbdb9f8682087291a4eac9f5b2f7c8d4aa7abff78ce8c53dd7285bd7be8572cb65ade906e8807a

        • \Users\Admin\AppData\Local\Temp\kb0.136.exe

          Filesize

          912KB

          MD5

          94beee2d6abd0cbb1667fa634fd39662

          SHA1

          2a108abe8675e52ae76a5dbc6f8596784472e62a

          SHA256

          a00384a1b1b311f280f9c2f4f7b9b81a1ada1596956e753c3f148fe29cc645e2

          SHA512

          e6eb3183badd8d596282ba902e012069cca36318b87dd92fb0dfe569f1c28f7e55c3ff724d938edd38b867ff2041e9cb248df9e1242d45a85c382e0115ad11bc

        • memory/2520-12-0x0000000002660000-0x0000000002822000-memory.dmp

          Filesize

          1.8MB

        • memory/2520-9-0x0000000002660000-0x0000000002822000-memory.dmp

          Filesize

          1.8MB

        • memory/2520-24-0x0000000000400000-0x00000000005D4000-memory.dmp

          Filesize

          1.8MB

        • memory/2648-51-0x0000000000400000-0x000000000049D000-memory.dmp

          Filesize

          628KB

        • memory/2804-50-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/2804-33-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/2904-13-0x0000000000400000-0x00000000005C2000-memory.dmp

          Filesize

          1.8MB

        • memory/2904-32-0x0000000001F30000-0x0000000001FCA000-memory.dmp

          Filesize

          616KB

        • memory/2904-49-0x0000000000400000-0x00000000005C2000-memory.dmp

          Filesize

          1.8MB

        • memory/2904-20-0x0000000001F30000-0x0000000001FCA000-memory.dmp

          Filesize

          616KB

        • memory/2904-14-0x0000000001F30000-0x0000000001FCA000-memory.dmp

          Filesize

          616KB