Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 23:41

General

  • Target

    ce2b5b8d68abf090181e46b3a3d01091_JaffaCakes118.exe

  • Size

    47KB

  • MD5

    ce2b5b8d68abf090181e46b3a3d01091

  • SHA1

    d5e71aca912fb415e66890417322aad41ae1a3f9

  • SHA256

    c1d6dbb531b4d85df214ed975a5340f93fe43c53b93e1a12381ac370e4db5187

  • SHA512

    13bdc16b8170d03a4289e73fa27b23a22e8520970dfeb043255fce849aca0888d3050f0dc660a8b797b5a23db9503ae6498024d0a34abf599773a50aa39e5cc3

  • SSDEEP

    768:rmNnDSb5J3a0N1DZKRkC4beGLJ8tRWX+mMKqRxXGFT0nEW:SO1W4qzcjFqPGFA

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce2b5b8d68abf090181e46b3a3d01091_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce2b5b8d68abf090181e46b3a3d01091_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\ZEO8EZUJX8K.EXE
      C:\ZEO8EZUJX8K.EXE FDONSZUYCQS
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2304
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "c:\windows\fdonszuycqs.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2836
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\HVB33DABNBS.BAT
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s itss.dll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2332
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2748
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2912
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s jscript.dll
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2180
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s scrrun.dll
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2924
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2820
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2980
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2972
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2652
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s vbscript.dll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Windows\SysWOW64\reg.exe
        reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2672
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s msvidctl.dll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\HVB33DABNBS.BAT

    Filesize

    1KB

    MD5

    8ad83a51d415c7d5d2beaf01d8083b23

    SHA1

    700fa9f0d42671a9086d02113eb892daab20e0b5

    SHA256

    39548db3192c9be6caa33eb253fcfa311d0e80f72e91162f1fa303f147caaacd

    SHA512

    23a34ded9eb7ae0813eb213a1441a3f1d03ee924a1131f874a2af00427f129896fb3287f71955fe106004f2e728a43bedea68d4a97c338b5f0aed5df187bb172

  • C:\Program Files\RFOORJHPV\7THSDF1PRW.EXE

    Filesize

    47KB

    MD5

    ce2b5b8d68abf090181e46b3a3d01091

    SHA1

    d5e71aca912fb415e66890417322aad41ae1a3f9

    SHA256

    c1d6dbb531b4d85df214ed975a5340f93fe43c53b93e1a12381ac370e4db5187

    SHA512

    13bdc16b8170d03a4289e73fa27b23a22e8520970dfeb043255fce849aca0888d3050f0dc660a8b797b5a23db9503ae6498024d0a34abf599773a50aa39e5cc3

  • C:\Windows\FDONSZUYCQS.txt

    Filesize

    47KB

    MD5

    76a9fcaf6429b229b8f1be2de1cdbfe5

    SHA1

    14798a06b0c083c5097cc764c2664755acd0b0ac

    SHA256

    5035b6f3ec6f6581c3641455bc0cd4f48ec64c82ae6b3f53700420fa2359eefb

    SHA512

    56e82755c14e62752baf5b9e480831293c235beb53b9f99ee6e7346b9a47de137197a900880ee8cb11773cdc4e447f72ff73e7592962fbb405c2b01f6c740c3f

  • C:\ZEO8EZUJX8K.EXE

    Filesize

    10KB

    MD5

    f2da5ae8487e3f7572e325334e54cf61

    SHA1

    45036bae670a2253c038092ec0cdf6ad34e13021

    SHA256

    1d87765c85931b53cede519163ed1de17e824584552f8d9747bdb5623dd640f2

    SHA512

    c611a49edf753110572133128a84d107b95f55fcb31b9ded1e86241651ee3e5033e2a637127caf857d60aeb3e2e902d8ca3ef7db34a3742a995a1316b2fa30e0

  • \??\c:\windows\fdonszuycqs.dll

    Filesize

    28KB

    MD5

    82ac13500b978fdb07c73e504a871498

    SHA1

    5e8478e261b48d63ca460bee85dde9cf62688407

    SHA256

    fd8f4a34328e6299045a455777b74f2f0ccf4fdca8899f66d1ee10d2a15284bc

    SHA512

    7620fd5885eea7f9a9d3a4f22f36470439cf01bfbd31eff6e06beec7d2b4b951080533572e2b9a5fa42c4c7cafe1c09ae000d4d2ca3ee7282a1b050248d8902e