Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 21:11

General

  • Target

    dee8e0d70968c3ecfb28b45925d3806f_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    dee8e0d70968c3ecfb28b45925d3806f

  • SHA1

    5635f05b9cb75caef220b04f35e66988fb513e7f

  • SHA256

    54a7c3632357caefcce456a6e9b34da168fdb1360b937c12ec7bb75567e52f5a

  • SHA512

    5aba59c32771214fedcc139424733cf80b6b1c5781811791ae6f6739d97036ef2047805c7a72bf5128ff849262e96b237dd0186dd21f1af439a6cc063f65a7bc

  • SSDEEP

    49152:1QJ64OpK3p+JgQX0Ywcp0MIG6c2gsSqzaHypDjQZetOH/pK:1QAK7Q0YRpJIGjttqzaS5QZ5K

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dee8e0d70968c3ecfb28b45925d3806f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dee8e0d70968c3ecfb28b45925d3806f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\ApepJafy.exe
      "C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\ApepJafy.exe" spa="C:\Users\Admin\AppData\Roaming\VissJat\Ledcood.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\system32\ipconfig.exe
        ipconfig.exe /renew
        3⤵
        • Loads dropped DLL
        • Gathers network information
        PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\libnspr4.dll

    Filesize

    288KB

    MD5

    74485152d7f2c06fe413f48c7da4ff33

    SHA1

    a07c30fedc80e5f4c2cc0be5202d64f51b015b44

    SHA256

    3c019cb209ba4f01015ffbb628d988735d2c5d9805abd7dd4dab441ea82eb688

    SHA512

    43b3b3bd5d5f3afd845cc79d68e942836f95f708eac96cd84d09b774d8f92f772b2353a273185b6be336603b5b283a486756e95ff26bb1ecd4fe84667cbe6f52

  • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\libplc4.dll

    Filesize

    47KB

    MD5

    08bacf2967fd8ea468c69f6e8d31b914

    SHA1

    eec97e847be6303013e468979b861ff74d4279ed

    SHA256

    2f143cac2efdc21b98620338c6f0404dfce812ee5741960ff68671ed0b0f3a9a

    SHA512

    2550e9481d2604b9c62b97ede184af4a8b2db1333b6707e01bc67b3699f72b0b764a238c86801d4457007e31977a181007f67c300f7c47899d4a771d05c2e97a

  • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\libplds4.dll

    Filesize

    45KB

    MD5

    56c1c79274ef5728b1f50986a5a8f22e

    SHA1

    32f67170194ce27736e564b5328dbab6c4be33b3

    SHA256

    8720171993fc29c517a8124b8235c2c5d71b0ae4c236685ba202088326d780de

    SHA512

    6198edad58ffbb9109c827de704a6d67be44300e7bf11d5af427e568388a9a746ce58e6c09babd65f6cf7dbec9520be6c9d92c7a4724c0892e044c38a9e2ce3a

  • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\nss3.dll

    Filesize

    834KB

    MD5

    9721a913f9a997a62c532d72ed3e7b8d

    SHA1

    2e1f33ec48938eab775f6775e4de93150b39b46d

    SHA256

    4515d073983b96bd48d2601fb22646d72aa56aec163cb172e6d06dd55b8a9e80

    SHA512

    7363b2192a3b0b5f946c14983b197315632907790871dd795b2d995d8cf924d9d3ad7af2c3b465b70f5bb110ba8aaef1412d2cc33bedaeca8c64e2a523678ad7

  • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\nssutil3.dll

    Filesize

    132KB

    MD5

    08b59a1793e8cd6fb085271650f8b5d0

    SHA1

    3182956535052ab496bc92f59167a7e114752b1e

    SHA256

    f0c14914986be4dc13a72fbe509db10a4c24c55e545471d1e4dde2c1d4ca03a1

    SHA512

    e2526879a4904f9e96b5f9422a088bfc4811f5ed3567fd0ad4021c10e6b796df10c61734cf59a2b2b36151fb1451660283284f97d7ff95eb3b78d6340f1cd136

  • C:\Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\smime3.dll

    Filesize

    129KB

    MD5

    88f553be556ae62c59b3a3fbea81987e

    SHA1

    166abd59cdf04380b939c3d216b514cbe09735f8

    SHA256

    741bf85f9011be7f57df51a409b9b43b45bed0329d14cedc05d0f84e60c66006

    SHA512

    d27e0ea06245782960bcffd41f9afbd9a7fe3bbb43f15eddbfa083568b21cc6dd15c86686fb597a0bf05d2bb4e76332eb7f28aba82e6a3695423f1458fb924c4

  • C:\Windows\SysWOW64\dnsapi.dll

    Filesize

    264KB

    MD5

    be2e45c9a6e39cfca041fdfc5c2f4c31

    SHA1

    d2a50ae44b9b76d74cfbe874be10faa803cbbf9c

    SHA256

    b31a1aff8a96df99ac51bb57de1995e5163494cba19db5bc8216ab8d098b588f

    SHA512

    ce20791c25dde75e188e86c015ffff3d390e4f61069d62f46f179ecfb3c9028b73fd5708bc5557c2a36b8fb55efe1b87ffce5bc3e23c0b9f0e13cd731c0f6f5f

  • C:\Windows\System32\dnsapi.dll

    Filesize

    349KB

    MD5

    a02ef1ea0254fd4a0742b765bf372dd6

    SHA1

    4124e6195526f9025e82fd068d606ac1956df63f

    SHA256

    6285c2ea09f69c013519bcdc39e609f512f1ffeed55f4a8c9aa75beb20ab0e84

    SHA512

    d015dcb63ddc7942cac90ec03a992cc1d56f84bdab95de35aaa9e24a5eeff170bea702ef95c73c75990f0b5df69656308f49789e40373a352b9e728e5fa8eb51

  • \??\c:\users\admin\appdata\local\tempfolder\vapfacmoxiu\misabariir.dat

    Filesize

    1.2MB

    MD5

    af25d07f63f213aae568bfdfee83d979

    SHA1

    fe98c80024d4ffff3c64340e098f9031500fe1e7

    SHA256

    08494d7c2505c5e1da267eee8a6c2eef1dd6f6c433ea5483d2ed5404518fae35

    SHA512

    3848c2fc4bc74e5e28931ed1495376069735d7755642d8914769858636f9444106e343bd8dde5f25b83c0f132d611d3764efd864995ef9cf9f416a187f0e3e06

  • \Users\Admin\AppData\Local\Temp\nsj897D.tmp\StdUtils.dll

    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • \Users\Admin\AppData\Local\Temp\nsj897D.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Tempfolder\VapfacMoxiu\ApepJafy.exe

    Filesize

    105KB

    MD5

    e34e9bdf244b083a91b90e9a36e67710

    SHA1

    c89e317856b948eda01a4d9c43b24cfeeac0c36b

    SHA256

    c74b214b01af5fd7cefb31799dd56b5f4e1617f80704fdf428d885b1814ce1c7

    SHA512

    9933b14d82a7d028a8ec101015794b66a4002aa56bee3278ed3b179e0b6cad8dd94b0209e548dc87959cce0b1be79b7379e145787ff3afa377ce5ff6438000a2

  • memory/1052-43-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB