Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 23:41

General

  • Target

    ce2b5b8d68abf090181e46b3a3d01091_JaffaCakes118.exe

  • Size

    47KB

  • MD5

    ce2b5b8d68abf090181e46b3a3d01091

  • SHA1

    d5e71aca912fb415e66890417322aad41ae1a3f9

  • SHA256

    c1d6dbb531b4d85df214ed975a5340f93fe43c53b93e1a12381ac370e4db5187

  • SHA512

    13bdc16b8170d03a4289e73fa27b23a22e8520970dfeb043255fce849aca0888d3050f0dc660a8b797b5a23db9503ae6498024d0a34abf599773a50aa39e5cc3

  • SSDEEP

    768:rmNnDSb5J3a0N1DZKRkC4beGLJ8tRWX+mMKqRxXGFT0nEW:SO1W4qzcjFqPGFA

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce2b5b8d68abf090181e46b3a3d01091_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce2b5b8d68abf090181e46b3a3d01091_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\ZEO8EZUJX8K.EXE
      C:\ZEO8EZUJX8K.EXE FDONSZUYCQS
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1864
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "c:\windows\fdonszuycqs.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2524
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\F1YAU8D.BAT
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s itss.dll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1748
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:544
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:1712
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s jscript.dll
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:1884
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s scrrun.dll
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:4688
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:3608
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:3668
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:3268
      • C:\Windows\SysWOW64\reg.exe
        reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:644
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s vbscript.dll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3492
      • C:\Windows\SysWOW64\reg.exe
        reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:4564
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s msvidctl.dll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3196
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4172,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:8
    1⤵
      PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\F1YAU8D.BAT

      Filesize

      1KB

      MD5

      8ad83a51d415c7d5d2beaf01d8083b23

      SHA1

      700fa9f0d42671a9086d02113eb892daab20e0b5

      SHA256

      39548db3192c9be6caa33eb253fcfa311d0e80f72e91162f1fa303f147caaacd

      SHA512

      23a34ded9eb7ae0813eb213a1441a3f1d03ee924a1131f874a2af00427f129896fb3287f71955fe106004f2e728a43bedea68d4a97c338b5f0aed5df187bb172

    • C:\Program Files\RFOORJHPV\45MQP.EXE

      Filesize

      47KB

      MD5

      ce2b5b8d68abf090181e46b3a3d01091

      SHA1

      d5e71aca912fb415e66890417322aad41ae1a3f9

      SHA256

      c1d6dbb531b4d85df214ed975a5340f93fe43c53b93e1a12381ac370e4db5187

      SHA512

      13bdc16b8170d03a4289e73fa27b23a22e8520970dfeb043255fce849aca0888d3050f0dc660a8b797b5a23db9503ae6498024d0a34abf599773a50aa39e5cc3

    • C:\Windows\FDONSZUYCQS.txt

      Filesize

      47KB

      MD5

      76a9fcaf6429b229b8f1be2de1cdbfe5

      SHA1

      14798a06b0c083c5097cc764c2664755acd0b0ac

      SHA256

      5035b6f3ec6f6581c3641455bc0cd4f48ec64c82ae6b3f53700420fa2359eefb

      SHA512

      56e82755c14e62752baf5b9e480831293c235beb53b9f99ee6e7346b9a47de137197a900880ee8cb11773cdc4e447f72ff73e7592962fbb405c2b01f6c740c3f

    • C:\ZEO8EZUJX8K.EXE

      Filesize

      10KB

      MD5

      f2da5ae8487e3f7572e325334e54cf61

      SHA1

      45036bae670a2253c038092ec0cdf6ad34e13021

      SHA256

      1d87765c85931b53cede519163ed1de17e824584552f8d9747bdb5623dd640f2

      SHA512

      c611a49edf753110572133128a84d107b95f55fcb31b9ded1e86241651ee3e5033e2a637127caf857d60aeb3e2e902d8ca3ef7db34a3742a995a1316b2fa30e0

    • \??\c:\windows\fdonszuycqs.dll

      Filesize

      28KB

      MD5

      82ac13500b978fdb07c73e504a871498

      SHA1

      5e8478e261b48d63ca460bee85dde9cf62688407

      SHA256

      fd8f4a34328e6299045a455777b74f2f0ccf4fdca8899f66d1ee10d2a15284bc

      SHA512

      7620fd5885eea7f9a9d3a4f22f36470439cf01bfbd31eff6e06beec7d2b4b951080533572e2b9a5fa42c4c7cafe1c09ae000d4d2ca3ee7282a1b050248d8902e