Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 23:31

General

  • Target

    bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe

  • Size

    150KB

  • MD5

    bd909029ecacae1f6b66104674d11e54

  • SHA1

    55857a93812c235fcefffc957a3b3214dc064fbf

  • SHA256

    41a0807c907d982c101830ff96495b367fb2aa3a96f413f4a42cda6f1965bb94

  • SHA512

    f8462cba91d897651790b9244198c2dc139338c4f651ed7064a3b38d8bb654669fea6728282174e7aa470cdcca60b03873e4901b59af825cbcee3b2a6d7dd519

  • SSDEEP

    3072:BJr4QJ4QB2xuNmraT74butfkchrl29FOBPIB9:jrTB24iUcchyIm

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\SysWOW64\Windefend.exe
          "C:\Windows\system32\Windefend.exe" rem "C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\SysWOW64\Windefend.exe
            C:\Windows\SysWOW64\Windefend.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2884
            • C:\Windows\SysWOW64\Windefend.exe
              C:\Windows\SysWOW64\Windefend.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:1656
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6520abb6cd324ff36288980ae8b5b29f

    SHA1

    b000a4a91e664e5d1b38efcb052d350c717792ea

    SHA256

    39a7a5cd67b89827c7c86c89b2bc949119edd18b2276d83616a575fa4a238186

    SHA512

    4bb90ba8a48cead6dc00960a86213741e4f74c83f80523da99a935c2a840a81baa628bc19645318b11c4105404832886835939e5fbdaad7254962d5e674eb79a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b41768d2bc0c456e62e54e1a69954bd

    SHA1

    d7eb6e344c1dbc5c76f432f55cb355f45c3560d4

    SHA256

    a4d55ec2732f63c6c564d2d707cae21fe3a62a9be44a4b11085ba0d4b9c6ee2d

    SHA512

    350704c888c8ab4de9a1fa3ec13221aeacb7fbe1ebc08f2940d1672bdab452b10993627d1a7bb2f03c36d4f9c0de0cc7a727ec6aab9db69eb3d4455fd426ebd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cd13ee44f8b785234ae1220421d7fea

    SHA1

    309aa4551b3803ae6cb5a56d58bc73af18def08e

    SHA256

    a3fb3d31d1ea8df40333dba7efa2ce1ff872b9ac283fa45fd4bebd9c504c8178

    SHA512

    e1a03ce1f1d1316dcfde707f4c9dc1b524603891aab742effe6bfa2c95794437f499dd6d7986318a49a90a77bc1dc2700d6bb95ccaff943dffaf029898b9ed6f

  • C:\Users\Admin\AppData\Local\Temp\CabC381.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC539.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\Windefend.exe

    Filesize

    150KB

    MD5

    bd909029ecacae1f6b66104674d11e54

    SHA1

    55857a93812c235fcefffc957a3b3214dc064fbf

    SHA256

    41a0807c907d982c101830ff96495b367fb2aa3a96f413f4a42cda6f1965bb94

    SHA512

    f8462cba91d897651790b9244198c2dc139338c4f651ed7064a3b38d8bb654669fea6728282174e7aa470cdcca60b03873e4901b59af825cbcee3b2a6d7dd519

  • memory/1844-12-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-8-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-6-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-4-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-17-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-20-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-18-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-21-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-10-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-2-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-34-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1844-14-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2540-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2540-0-0x000000000040E000-0x000000000040F000-memory.dmp

    Filesize

    4KB

  • memory/2540-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2616-87-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2616-88-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-28-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-22-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-37-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-35-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-30-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-26-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2692-24-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2756-48-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2756-49-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2756-67-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-83-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2884-71-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2884-70-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2884-68-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB