Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 16:41

General

  • Target

    b43a337eaf7202c3e2f9e344d42fb9d5_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    b43a337eaf7202c3e2f9e344d42fb9d5

  • SHA1

    c26f387ee032b6140c742273b40bc55cd65ade05

  • SHA256

    dada32cbd82318063d5af1f11e8a8a510102fa129d2caba30bf2c04810b1576c

  • SHA512

    5190c601ec41f025f66d12a22161430d8568bb4faf34691082ed09bde730777854a168334d704584d8392af50ddd3ba3ef96ec62eb1040f7dee7a71b8d1dcab0

  • SSDEEP

    24576:mFxS0wzdHOzWJnUrdQnTkJ1Ru9SxT+mJDz6yd/9pnrwA/d6s:0SLzdHisCdIQ3Ru9g3Bm+lKUd

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b43a337eaf7202c3e2f9e344d42fb9d5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b43a337eaf7202c3e2f9e344d42fb9d5_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\ICQAwayReader.exe
      "C:\Windows\ICQAwayReader.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2644
    • C:\Windows\SysWOW64\expIorer.exe
      C:\Windows\system32\expIorer.exe 1
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\ICQAwayReader.exe
        "C:\Windows\ICQAwayReader.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.firefox-browser.biz/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1928
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:209940 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\expIorer.exe.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4ca201306cf004d1830acf27cd280126

          SHA1

          21ba12429f53979639cf6ee41d6752d1249e766a

          SHA256

          17e1c7811c68de839667bacc9ded94c1068fc3011ace2917a4b8d54a27807cdf

          SHA512

          1e158470c5d6c835c8da654b398a97a51a73e1b9c71b05ae94e88a7f015e101db354c0c58b308f5efe4dd4d60cb2ce59f6beea244d25a6af84fffe08cb75b314

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1370896b701b090630d760cd56963982

          SHA1

          bd4a8bc4497ceaa975cdf0c20b550e68556881d5

          SHA256

          4574abcb13f9a387fef82780877dcecfa787864ad633a557ee31f26d22624ae0

          SHA512

          5435e81e23fc845d3cc04d36c4472d173041785c49ed8b1486892dce640c8100f23cdda55406a8897134b691f43f1ccd3a17c8bac6820ea7104c4c55080575e7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b5ea92f7178c68bc8ad04b61f2d24a92

          SHA1

          4377ffd555f25734631c706f2465e14fdf28d941

          SHA256

          93e7af980e9f44e9d1d33521857d36976e078f5c6a7b699ffca7924e251dfc6e

          SHA512

          6c3d6e1b6f1db781f70358f2157a1e9afc32225a2bf717b7722cd628e9b4040253c8cbb51bde982477cfd53664c650b64ce5d1f9b3cc2b10da6eb6a96ca17ba8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ed219333147bbd1ec98473e804a3e5f0

          SHA1

          100819c0c9eefc0acd9189c26201da008a789ff7

          SHA256

          0ae60508c8aefb58c9b41c887fb77e96cfece4f11ca08d798d6616bccc785b12

          SHA512

          3413bbaa29e30e01ebb6747e66fc9ae2a8a3f99ae8aac96f6e897a7cd1950476ec2e885bdc873330f317ec4161140ebfc819a42f6bf7bdbc8aff8b72d6e79cae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          01124fa80f2aeac37e78cc2155fbaffc

          SHA1

          fbee329b877a546f532c25e46af7fc9eaaf49cad

          SHA256

          1e4fcae39d4fbf28fbe7328fdc494b4a210d36642b8ae3991d17f4160e6ec613

          SHA512

          f4f3eeacb23a924b640d14ffe7c4d2e2477678d9cd7d6c692c93667415eca32349027e8d591843e852d7ab8dbea9c1f6498dff4958e5180a6dbd00107b00cb2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6bf3cdbcf4791b6c34fa879be801a109

          SHA1

          872f274a95447e498266814f2f7a8cddf1cd4c62

          SHA256

          d055b4fc1e0ac488b2f896edabd88d6671f593b24abe8df5391c2393dbd2b6fa

          SHA512

          ad4b7e1d4124462dde51ed5f143961d70e74d22f55c04302793285ce4800c35422e0bf2c705ab6770a638bddf078409119c9c33978991535cace17853e915f4f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          299e324e490c3193b900bfce78d5f766

          SHA1

          6bfcf62601ddc300b97b264bbd315fa18e05be62

          SHA256

          5bb4d405b38fa3ca7beaf4cd9d624bab5f1488196b1c0c639dcbe6099c6aac87

          SHA512

          9c9c43f52291509dc7d4ec501b1e2aac96990521948a9c0eef81f46606dcf1bbe866d32547e403ccf3785874e12472800e0fa306d1b11ad0ad2b4796a0cf10c4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f35da65d563e607cd6794607ce7e0add

          SHA1

          5070c21626da69fb658a9f652a723f95f6097a70

          SHA256

          b05ae98ca9b204c28d1df06edbb2c7d9a046dcc7ce9af0ca8f4702b6d2357609

          SHA512

          9c134e26adec1c9fd9f489baa74a7374397da951c684ba38b7c1cd4bd2c84e465cacf380af1b734265ae39b0d70e38b6d766eee29451c0868ecec590a0a9cf9d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          99436cefa84a13290157f165790f3f94

          SHA1

          b074a58afde3f176d32a7f28acfc4e1413be21d3

          SHA256

          1d21811f6e919e356c79ce3052440ae457c7a92fdafa53aa93161e804ef64faa

          SHA512

          c5e2ceb79aff42ef70a0ae59a7787ed8647c2582f26478eb6f10be3509b49fbadd98e1f06ca606b84b3bb6260e5c55c27cbd84784c4e70184f2e7cdd7db898f4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4d1fcc7219febeb6fbed751f4b83ddee

          SHA1

          87a71665578ffcdf7b00073a0e25d12a3e0153fb

          SHA256

          d57eb3055e21cf9355c5f0f29d436b3dc7ac7cb3d71724c93250672fda6981ec

          SHA512

          891d7227e07b7b910165f96eaefd0d817151a1aed1d0f98d388df587b92209e10b4af17c063468a8711bd879a9b76cb449dd56423c3333d6479d21e6220642b2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3503adcc880cb8ce6028aff9f9228e47

          SHA1

          9df3886d40995e5a080272312b1fcb241871870a

          SHA256

          df1890f4d7ed07f049db747517e858f5616dedd4fa53fa3e6888cc8beb865d3f

          SHA512

          df2a26dda716ac11047ac0b9d0c0e3303468dde98fce3323db78c6d0ad065ae4effbffe4be4bb56cfd9c835136ca9ec901de923fd6c40ed2820938473473cf8c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          78a8f0bef99a1910bbe6efd157f848fc

          SHA1

          420a9bdc188cb80cfc3d08612593aafb747ab5a3

          SHA256

          e5fc3dcf5ca6bda9089b3f32ee8232ae5a3926f22ab6a5434995a2429637839e

          SHA512

          49d1c8f51e5e7b4272d02881ef80ba9762b1ee28f91145a20a78a839cd8767d27a81e43810b62f5c4fcca12d763dcb17478c8c80f9a2cd8321db8c883d203602

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d62d16e0cbf7e2f4912806f0b90f2742

          SHA1

          ff9e1eb8f6a6de951a654cb8b1b35b564bf73c45

          SHA256

          8a64316ff3f0b0325c85e81d097fecbab8d9729ecd4c8d946cbf9f2d94929035

          SHA512

          dcd4f2ed417f80e3f3c630b4d7178a3d5843bacccf1a614d738b0782bc0132249b9e8bdf1f5d9dcc6d4c3906de854580ed17a76177ea7b16a0301af80c090528

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aef85563ca6236094fb8781d3979ed02

          SHA1

          15548c17cac33a1fcc3229848cc8640e4f7f7fbb

          SHA256

          aabc9ba1b34792e432ef25e7876071063cecc1d845074d5d44a7339ab9fcc935

          SHA512

          2449a29fb09e2a4f5e7d63b5333eaa126549616cde8561907c51759115230c691f04638deebe6094cdedbb10f62724aeba5f2f102605331e86bcd2870e5c0e0d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d62afed95cc8daf1e3a301bda611c09e

          SHA1

          99c8fff097ba51e8fcdf923929dc354566307c60

          SHA256

          25d0dde69f324ae3f7b1b15d6046660dcc1eb4fa0fc479cc8bbe4c3f0b31d2f1

          SHA512

          c586ffa3ae7b23e3337dc1f671f8b33513c6690c58592710a16588160f45618d095479de47a4a6851599f5568ca5f0d050b1048cfed65ff4884f6f8b99537554

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cdd9e128d6f8bc28b316b0ef0bfec508

          SHA1

          d7d25b58c7b853ae12a2b3d0dd064a3d4679af06

          SHA256

          26353340967aa8655f617c2474d377ab25ae6185cb3d2b4a526fe762a41c8060

          SHA512

          24d237d70fbc1c9c04e9c578009e6bcde6e90284202dffc955cf28e7db4d9802cb8726d4c43ff6da4f2361d9c2b7212274c8b3e517626ea6033994378ee66200

        • C:\Users\Admin\AppData\Local\Temp\CabA02.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarA92.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Windows\ICQAwayReader.exe

          Filesize

          240KB

          MD5

          e6b7754c9f8c878449764e604c4a16a5

          SHA1

          dff1c7db949180d9bc435c23901a63707c23a586

          SHA256

          803136a62b579442434fca557b9c0406fe4ba153e8a815da2bfacacb90212367

          SHA512

          cf09e9ffc634f90467e9a18bd51de18575fa164068b86f7a4a9d3acfeaa31477895b381218c599f5ca9b99eae4822ea5aa3c22ee7e92ba98a9de7e7421d99dcd

        • C:\Windows\SysWOW64\expIorer.exe.bat

          Filesize

          209B

          MD5

          ba51ad179c216b9f32974ed4b1c09db5

          SHA1

          4db7eaec78e8c8a8c0dd8046fe0907581858b7f8

          SHA256

          2d2fc98db6e98c2e20fbef056b1ee91fc81cfd888f1757da29267c0126662c4d

          SHA512

          c4a7cdcec5103e1076a4e9bb95544bc23d0017e7e03ed57b42d1b74ec1d1326a4e795821817c2a74865f20eb00672b3a0fd464ff76f791b152bf37e2107c4d6d

        • \Windows\SysWOW64\expIorer.exe

          Filesize

          1.7MB

          MD5

          b43a337eaf7202c3e2f9e344d42fb9d5

          SHA1

          c26f387ee032b6140c742273b40bc55cd65ade05

          SHA256

          dada32cbd82318063d5af1f11e8a8a510102fa129d2caba30bf2c04810b1576c

          SHA512

          5190c601ec41f025f66d12a22161430d8568bb4faf34691082ed09bde730777854a168334d704584d8392af50ddd3ba3ef96ec62eb1040f7dee7a71b8d1dcab0

        • memory/2064-32-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2064-46-0x0000000000401000-0x000000000043D000-memory.dmp

          Filesize

          240KB

        • memory/2064-19-0x00000000052C0000-0x00000000053B4000-memory.dmp

          Filesize

          976KB

        • memory/2064-28-0x00000000052C0000-0x0000000005432000-memory.dmp

          Filesize

          1.4MB

        • memory/2064-59-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2064-60-0x0000000000401000-0x000000000043D000-memory.dmp

          Filesize

          240KB

        • memory/2064-16-0x00000000052C0000-0x00000000053B4000-memory.dmp

          Filesize

          976KB

        • memory/2064-44-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2064-0-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2064-4-0x0000000000401000-0x000000000043D000-memory.dmp

          Filesize

          240KB

        • memory/2064-2-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2064-1-0x0000000001DA0000-0x0000000001E93000-memory.dmp

          Filesize

          972KB

        • memory/2516-45-0x0000000000400000-0x00000000004F4000-memory.dmp

          Filesize

          976KB

        • memory/2516-62-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB

        • memory/2516-64-0x0000000000400000-0x00000000004F4000-memory.dmp

          Filesize

          976KB

        • memory/2644-21-0x0000000000400000-0x00000000004F4000-memory.dmp

          Filesize

          976KB

        • memory/2644-499-0x0000000000400000-0x00000000004F4000-memory.dmp

          Filesize

          976KB

        • memory/2644-69-0x0000000000400000-0x00000000004F4000-memory.dmp

          Filesize

          976KB

        • memory/2744-51-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2744-33-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2744-31-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2744-30-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB

        • memory/2744-36-0x0000000000400000-0x0000000000572000-memory.dmp

          Filesize

          1.4MB