Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 03:51

General

  • Target

    dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe

  • Size

    293KB

  • MD5

    dbc292a2292c6061700236830d45ca91

  • SHA1

    fcdfba4b95c145a715209d694639de6be0478f6b

  • SHA256

    e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60

  • SHA512

    551e097fb31a5e7a6b6ecf602f7ae8cb63dc620940fe47b003ebcafcedbfdb391731cfce399b48111ee9524f2272f53eb4076c84f65e377336930fd6b3c3e0fe

  • SSDEEP

    6144:6qcbmoTtMUxxzP75a2eoEnnZcYupty6DPlQ82hmbN:6NTTyUX/5a2NGZcTs6DPlahmbN

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 23 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s "C:\Users\Admin\AppData\Local\Temp\\\35.ini"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Runs regedit.exe
      PID:2336
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun96.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2860
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\35.ini

    Filesize

    139B

    MD5

    bb454b063043f484326575ce60d587c1

    SHA1

    cac3171df8fc25526a82356ed53f1c45a86167be

    SHA256

    838a54026108ff550f5d3c425cf7852abea41882590863e423cf9e94573dc11f

    SHA512

    8c86e46eea787025937204f93738c02f1d5268c19e20126d86df5f1bb3d15367935b3f23e5c6c482b462ac79dbbcc87b38a952a3a8567bf9a3cff2a68ab92099

  • C:\Users\Admin\AppData\Local\Temp\srun96.bat

    Filesize

    191B

    MD5

    5c716e6579353075cbb7d67cf9d8d0de

    SHA1

    b033eba781a4eaaecd015fd59189b26ea7dacd13

    SHA256

    b0cc60f962361c2bd560bf09989246ac8f48ecde94d1b3edd99e50aa6322a42f

    SHA512

    92bb090fe51ba17472cced2921b471666d2739783c1fba6e347479ff084f8583852bc057dd90b6b1fca6acb76a063e034b98f42a0b159b0a22fbf97b3ab8d069

  • C:\Windows\SysWOW64\PnkB.exe

    Filesize

    293KB

    MD5

    d35bae95bae2981ea43f8d07d8a7350b

    SHA1

    11a9f88b5a706e095f451598cd3452397c467dcf

    SHA256

    185d5d42dbe1107c58a8e940199d428cfed8ab1420f87c2f970affc273c64a0f

    SHA512

    054a0cf5f5d18f1f143e88e95a22be4549bbdd29c1407bdb6d20198f3cdf49955c8ebecf8906a7e72e5ede4d74a0608bff574fc48abe88903768446631df0de2

  • memory/2572-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2572-22-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB