Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 03:46

General

  • Target

    d10092a7d35556340446032e6df214f4_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    d10092a7d35556340446032e6df214f4

  • SHA1

    f6ec8bb3ffa13577f0ed2c773d64072e3f714b26

  • SHA256

    2a0c3710c154dc26dc8fee216ea6c079420819de0fc90b08a3e5a9c8810d8a7f

  • SHA512

    212ed46bc9b7a56af1bb758fcc92423b74ea370f47e1dc5f2ecf37c8d6a5b97745bf8df0f331c06899d457014eac8ffcc2e14e1bcad859bbc45e744c1c0ab836

  • SSDEEP

    24576:0MMSw3gK+vH1+FtObBQULfKDPtY0fO6FcrAalx9IouY/pYK:lZ1KHFtOaGEm0muUx9Jz

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d10092a7d35556340446032e6df214f4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d10092a7d35556340446032e6df214f4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\rundll.exe
        "C:\Users\Admin\AppData\Local\rundll.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2316
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c syscheck.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V rundll.exe /D "\"C:\Users\Admin\AppData\Local\rundll.exe \"" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V rundll.exe /D "\"C:\Users\Admin\AppData\Local\rundll.exe \"" /f
            5⤵
            • Adds policy Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\syscheck.bat

    Filesize

    170B

    MD5

    d53c75977954601b591dba8be2f53cd1

    SHA1

    5073b31394b4bb63af3d7ec0985d3a66d209abbe

    SHA256

    789c15d1350284cf0270658c414fa4ed204473644675cb13f9e3981d89724090

    SHA512

    baa379fc240cc3e26155eaf71fa61fad78ba781f00615055e5227ccaf81bcde74723231d20b157ed2a78bf354b617da5d9d21a0badb11eb1bb3a87a86cf40ca9

  • C:\Users\Admin\AppData\Local\ntdata.dll

    Filesize

    285KB

    MD5

    fe2232f82e4beb5ae483da8e699e1a51

    SHA1

    ed2131d0f70e709f8791bfff64d2b8a4cb658ed5

    SHA256

    0cb462094392aeb31dd7588d95de2577efd0987315be0ce84a531c26bee3b49e

    SHA512

    df9ab5afb94cff850dd5c4b4ba0cfcd77d4a5887ac85a60db223eba8c5d1d64467d77c6133b8e1f5ca795deae3623717ff4cc669919d9f96ef6df193187fcc0b

  • C:\Users\Admin\AppData\Local\ntldr.dll

    Filesize

    92KB

    MD5

    8a5e40eb6518353e5758e5b237897c78

    SHA1

    dd452e565485f48c2131dadc40a32b0d3007cef6

    SHA256

    5f8ba5c1522847452d92b507770bfb454548d8a02232040c6be4323792400d4f

    SHA512

    c941b82c3bd6be61506ac9215ab8e26983a8654444703b5a0236739a3b50a498ed0c65054b68481c026123d88b0f0e9e36f92b0f0028b4cc034345ec17f3b268

  • C:\Users\Admin\AppData\Local\rundll.exe

    Filesize

    237KB

    MD5

    cb3630301ffbc6db112f2a29510c834b

    SHA1

    eb4b5df4e5192425113e40090c814f0852c7d4d5

    SHA256

    cfeb2809a65d1ffa3bf40fc4463fa8c6db12ee0ac1964e3bd6099a1e1b9e9bc9

    SHA512

    1134856c2549f9f6acda19914cfdd404551cb5fa169a059134afacd2d374ef14753fb9ab29f262e39dbd5c50e4f5151b5aa86d2998777159009660c94f0646c6

  • \Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    823KB

    MD5

    eda62064589a56c4b4c6049e8df39fdc

    SHA1

    f5b408d2630acacbb3bd360d82f72a793a9d94ff

    SHA256

    4cd4cc2e9701aedd9052472fffee6c8ad6f6b476b6eba010392dfc6ef10b434d

    SHA512

    570d9ef5af0636eef789a21b743f72324e1b043a497053c1e26f3ac6d5746f16ba6603e6ffc4e15a272730c14004bedd6c062696ae5f0b71624db9191f7fd736

  • memory/1172-7-0x0000000004000000-0x0000000004141000-memory.dmp

    Filesize

    1.3MB

  • memory/1172-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2244-41-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/2316-40-0x00000000002E0000-0x00000000002FC000-memory.dmp

    Filesize

    112KB

  • memory/2316-32-0x0000000000230000-0x000000000027C000-memory.dmp

    Filesize

    304KB

  • memory/2316-42-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2316-44-0x00000000002E0000-0x00000000002FC000-memory.dmp

    Filesize

    112KB

  • memory/2316-43-0x0000000000230000-0x000000000027C000-memory.dmp

    Filesize

    304KB

  • memory/2316-45-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB