Analysis

  • max time kernel
    2s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 13:53

General

  • Target

    d672b3a0263bddfa358dd126702b5bf9_JaffaCakes118.exe

  • Size

    145KB

  • MD5

    d672b3a0263bddfa358dd126702b5bf9

  • SHA1

    8eb2e79eb7dd7370ddb4a3c46fe85c39cf5f8937

  • SHA256

    055c6ad96af409328ebe9a4e8ff7189e3a986508d32a2950223d6a1bc4afe98b

  • SHA512

    82b1b9d54a9383b6e829d51e278f765d9489a426d98095cff821e2e9a57bb54079aed4aec830be87aa6f18f35aee41737967b389c0b08cce84ed2c71d14fe0cb

  • SSDEEP

    3072:knN5HYBvjr5SM/yv7VDVKMOQg5H1i8fZ5Ys+iyXFm+GqVphIw:kNC5P5SwQDVKM0H1i8fZ5YxXFm+T

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d672b3a0263bddfa358dd126702b5bf9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d672b3a0263bddfa358dd126702b5bf9_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\Exporer32.exe
      "C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
        • Executes dropped EXE
        PID:1272
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\PCGWIN32.LI5

    Filesize

    2KB

    MD5

    6cf7bf1fbdb96c9b19a50a57cfbe73fc

    SHA1

    b0e0b3873c4865ac6935790e5d083ebcbc77ae9c

    SHA256

    2d5832a4ecba11963629a76b19f1be2965df6ca84ba1a85c152c5e671995077e

    SHA512

    b97da7f8f6703c452e162da78e33f323057d5e28a5e9a2cb4921d72f63c49e6a1bdd8259a47bc25441cba259e0038af9ad8980c7b0ab7de51c6c71c8e5ea63c7

  • C:\Windows\explorer.exe

    Filesize

    2.7MB

    MD5

    ac4c51eb24aa95b77f705ab159189e24

    SHA1

    4583daf9442880204730fb2c8a060430640494b1

    SHA256

    6a671b92a69755de6fd063fcbe4ba926d83b49f78c42dbaeed8cdb6bbc57576a

    SHA512

    011bfe19bd15dcc0f9850575e20d7f2c01160ec98ba461ad59a51b9417049e6475648b9056990247699624b080cf609ec7b5409231cfb46a012d723f7db08d81

  • \Users\Admin\AppData\Local\Temp\Exporer32.exe

    Filesize

    33KB

    MD5

    7e379619ddab7417a5b3a8a73b2c1177

    SHA1

    5a3977aff043e26f75ae369e8aaa3f9fd3b5c450

    SHA256

    a02d3199707b973a3ebaa57b957ef9ea605a1998b844ede23289cd39a28a28a1

    SHA512

    518db5b4bbaddc942110819b7a23145355b00c73fd02be2e4767835f35eada059e3aabe1565491b1efc5130344f6ddfd509f8719c3d824c27a0caad854d4bfe2

  • memory/576-28-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/576-36-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1672-11-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/1672-10-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1672-23-0x0000000000500000-0x000000000051D000-memory.dmp

    Filesize

    116KB

  • memory/1672-27-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/1672-26-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1672-22-0x0000000000500000-0x000000000051D000-memory.dmp

    Filesize

    116KB