Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 15:21

General

  • Target

    daa49d2b7e67b315ef5114db94db05c9_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    daa49d2b7e67b315ef5114db94db05c9

  • SHA1

    57a2f116908d4fcce53c33fa21a7e906f59196ed

  • SHA256

    2419638b693eeaefd46b9e2483a710bcf627b7c6fbc706d6843f9269a845be88

  • SHA512

    a38649589d150ea02949a32dd81a9b98167821ff895aca5478b938cc6ba6c7c0bccc060de7ff89477094054cf4622ef28b09f9fa0df602578a98e794e8af7e12

  • SSDEEP

    49152:vDFmHCAgrGk0e28C5e5taZZjrrdcmmYrF/OUE:v3Ag6ojCZZ7ymJ2L

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daa49d2b7e67b315ef5114db94db05c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\daa49d2b7e67b315ef5114db94db05c9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Local\Temp\170a43c6\QHCBM91jkKC.exe
      "C:\Users\Admin\AppData\Local\Temp/170a43c6/QHCBM91jkKC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1160
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\Vaudix\t2Ylxv2GkU.x64.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:224
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\Vaudix\t2Ylxv2GkU.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:2248
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4452,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:8
    1⤵
      PID:1232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\170a43c6\QHCBM91jkKC.dat

      Filesize

      4KB

      MD5

      9f25df3fcf5e051a82f602f4cb66bdec

      SHA1

      e0f1f9b4a2cbee30697ed9699e1bfe72b591a489

      SHA256

      27d79e70562251491c9d273bfc01192f602e259822e9e630b91721cb2ee0c859

      SHA512

      c469d5a9471e40070382eb9de853e74036abd20aa0dd085e314ae4d89becc1f222418587b44b05509b990aeb4cf4411c4719226e6e132c01cd8b8569a19b9616

    • C:\Users\Admin\AppData\Local\Temp\170a43c6\QHCBM91jkKC.exe

      Filesize

      713KB

      MD5

      7e57e14ded1c4a5f01f3f68d5dfd9172

      SHA1

      85c687a742039a0c167ee0dfb4f233355cc53925

      SHA256

      55b93377719f87ecb5799aec86c9401b11065ca7109dba85cc3709303c09610e

      SHA512

      db9280497bb6a6cc8e216924a5507167c607929388a5006c9ce7555cb545ffbeffa84cbb1eb3ea11af83b263572427dc9d0abc947c83e603d784a7829d61f855

    • C:\Users\Admin\AppData\Local\Temp\170a43c6\t2Ylxv2GkU.dll

      Filesize

      448KB

      MD5

      77ac4b7f992e09184acf58efe97293cf

      SHA1

      440396ea69eadffa7d152517a4ccfea24489ac46

      SHA256

      7f58fc2daaf48877e9e9640c6e9e804ba5aed3c15f72a1620e3f5e24f29af0a9

      SHA512

      6606e88eead423a0312d23e4f2bd2281782af2588cf7daa955139b6c383250269e4710c9efbf494b93895484ef1033b2ad3561bfce898333f8459c8636108030

    • C:\Users\Admin\AppData\Local\Temp\170a43c6\t2Ylxv2GkU.tlb

      Filesize

      3KB

      MD5

      10d7cb61f6ea9666fdf0cd5c41170b52

      SHA1

      82bb8eb6f00cab7db9d2ec0ba01f6fe8ec8cb0c8

      SHA256

      1e3a25d1e6f1c0e53e0328bde3e635d4d9f161540689911c0d8c3a9ccc333a2d

      SHA512

      bf6c86174fac565438ed6e926305578655366c5cd6faea8ea89d29479efc65e5ad2b758dbced063f26e012cc8147a17faea686a08e57a75dce23df9eedbc4f9c

    • C:\Users\Admin\AppData\Local\Temp\170a43c6\t2Ylxv2GkU.x64.dll

      Filesize

      503KB

      MD5

      a335d72f01e80dcf234287dd1097d484

      SHA1

      c1ea2b5b0bef57b663ef8c85ea751dc6bb2e6970

      SHA256

      16701e553f85f3032b5d9e82968cf1e0ac3a907936d4df713ebdc08864b7705d

      SHA512

      d82808a5cfe882d6b746233d7e0fdd2d26d1cd5641cc3ec0c53560975974937456c769c79b631ab2f57319b1c7afdb5f8cda34cb842a24d2c7a4de5243ae61ca