Analysis

  • max time kernel
    147s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 06:00

General

  • Target

    c8551819944aa0b42b404e8a57696f99_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    c8551819944aa0b42b404e8a57696f99

  • SHA1

    991636fbefc638a505a2bc408a5417b02e6b1886

  • SHA256

    881b6cfac026b21fb16d440f2239ccc8200c81c756ebcf334ba6f4b325f019a2

  • SHA512

    7b84e9a2495f0a9e4dc7845b080d7e3f3685884b801fe39c62f4862ba8954b79a14c3e015ce17b21f9f6f5a63f7f1d86530b35eee57bea12d1907aef0e12906e

  • SSDEEP

    6144:nqhMPkbj8olritKpGmgXIaik9gvrmQGfMcIZnpYAHIe+cg/fp:uEKGLXIJkwrmrrIZpYAHnk

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 34 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8551819944aa0b42b404e8a57696f99_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c8551819944aa0b42b404e8a57696f99_JaffaCakes118.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\c8551819944aa0b42b404e8a57696f99_JaffaCakes118.exe 
      C:\Users\Admin\AppData\Local\Temp\c8551819944aa0b42b404e8a57696f99_JaffaCakes118.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2160
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\wvcv.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\wvcv.exe" c8551819944aa0b42b404e8a57696f99_JaffaCakes118
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Windows 3D.scr

    Filesize

    76KB

    MD5

    9dfa18597238a85ef005afea97ed0b57

    SHA1

    5b9e8405052dc036b8bcadf7c875932afa4e711c

    SHA256

    edd79738ddc66f96acb3139754f775ab100cf7fb5c6a77da1b74ab0531d4b5e9

    SHA512

    62b62ed2b510f9a5d838b8eaba1ac0c879a3bb21b05bd557e9a95ae01665572c20c057f813d26abc65306696624636e2b2fda7b3a30d0bf515ef1514f9e55d15

  • \??\c:\windows\SysWOW64\maxtrox.txt

    Filesize

    8B

    MD5

    24865ca220aa1936cbac0a57685217c5

    SHA1

    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

    SHA256

    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

    SHA512

    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

  • \Users\Admin\AppData\Local\Temp\c8551819944aa0b42b404e8a57696f99_JaffaCakes118.exe 

    Filesize

    288KB

    MD5

    e5f457e3d89281b97b099a757b4d9577

    SHA1

    aa8a49a5cfff30f5cdd23a7659b1c3ecdc734711

    SHA256

    ebcfea076a3bdca680525b5ce11e7d918cf574f800971a4ddd081f5a6069f0b8

    SHA512

    ffbb2880e10084c187a8dd3c42198782bc50a24886b2a8ee523b4c70a2dbb0b46ee1aa799f44bdd5129935d9d12b3c09e9566278b2f088ede8a39c6ec203663e

  • \Users\Admin\AppData\Roaming\Microsoft\wvcv.exe

    Filesize

    76KB

    MD5

    7a65fc3a05bc34e2608f2dc781494803

    SHA1

    501ff02120b10bd74fd1f4ebab71b9bb2884e252

    SHA256

    8f07e447d5230f5012f10ce0f7f614a38ce3902ac8b702ac28292e39dc904ed4

    SHA512

    a7917e12ec09e4a500d41e346666bb124d428789265af5891037395cbe463ab547d87ff0ea8b40c0315cdd7d5105dc56049f2a813142c88b80e561878e525315