Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 02:04

General

  • Target

    d57c713b81a6271f6384385d7d146bf9_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    d57c713b81a6271f6384385d7d146bf9

  • SHA1

    26389af4c0747902c9035f2d153a214870f89f7f

  • SHA256

    64be09d71902d1337fd8f734faf37d501b75b269a0af3ada0da3bad59b8a5349

  • SHA512

    517bdc6d31f3f23dc0f96b1f76a6ae524ba4fa137e9c48cede835deb4f17975cfb340decc8164c9bf7ef4999efe4a71f04062ba14c67376a2a11b0412e3980ff

  • SSDEEP

    1536:/OxAisOOG+U/Yog91wDJaBel5eoafhjkTs5XRb:wjsOOH/wFrl5eoKhYTsH

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 32 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d57c713b81a6271f6384385d7d146bf9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d57c713b81a6271f6384385d7d146bf9_JaffaCakes118.exe"
    1⤵
    • Drops autorun.inf file
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\SysWOW64\regedit.exe
      C:\Windows\regedit.exe /s C:\Windows\$$$1.reg
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Runs .reg file with regedit
      PID:1048
    • C:\Windows\Explorer.exe
      C:\Windows\Explorer.exe C:\Users\Admin\Documents\My Pictures
      2⤵
        PID:3416
      • C:\Windows\SysWOW64\regedit.exe
        C:\Windows\regedit.exe /s C:\Windows\$$$9.reg
        2⤵
        • Adds policy Run key to start application
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:3948
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\$$$1.reg

      Filesize

      200B

      MD5

      299ab9362ca5106ae0c72eb4ac2adda7

      SHA1

      6ad0ae383434486a1fe42ccf0453c53c5c1b1320

      SHA256

      9c39c959f6963f95df88f8fcc1d6651a940615e0ee2faeb422c3bfd5ddfd0b1d

      SHA512

      1d4a6689d1389e521b3827cae88c5a175a157af92a3e667cbfcb4d1a92c60dab7fc9faeebc3f7da5b8542b19fa126fbc05770bcd34238249d15df3fa08e7c02c

    • C:\Windows\$$$9.reg

      Filesize

      174B

      MD5

      82b20cf76f7ea5e316bef622002ed9ba

      SHA1

      c037fe53a55f4e98af0b2dbd496d88587c62cea4

      SHA256

      0c41603de2c858b5749741255a5e50aca1e7f7dde6cd042660c71ebdc9439c88

      SHA512

      4956d42603eb3ce58aeb885444b29083a1e11b9786e4930b80d32e69a47753ac5f7044ebeda9fe1b8c93aa0dd4b880d35f3286cf62fec7d9877374382e3d4d08

    • C:\Windows\OLEUpdate.EXE

      Filesize

      100KB

      MD5

      d57c713b81a6271f6384385d7d146bf9

      SHA1

      26389af4c0747902c9035f2d153a214870f89f7f

      SHA256

      64be09d71902d1337fd8f734faf37d501b75b269a0af3ada0da3bad59b8a5349

      SHA512

      517bdc6d31f3f23dc0f96b1f76a6ae524ba4fa137e9c48cede835deb4f17975cfb340decc8164c9bf7ef4999efe4a71f04062ba14c67376a2a11b0412e3980ff

    • F:\Autorun.inf

      Filesize

      157B

      MD5

      524e0d91fc238c32eff75837dcebf7d2

      SHA1

      596cc0c5fb80463c4fbc1aa1c58ba701b81d4ccc

      SHA256

      7dbb2534e6b77c87b8ae7ec5ad67b276858d58a931f3bca410b378f9fd0bba89

      SHA512

      d7e226550346f26e571c85aa877829d49a42d4dd12919375d29470e62fcf8f424396de3248ab6401e4a00b916b8534331951f276f737553df9c8c8f30a8895c5

    • memory/452-0-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/452-20280-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB