Analysis

  • max time kernel
    133s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 08:09

General

  • Target

    dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    dfcb9e0fc1f969697fd80cf34f5591e5

  • SHA1

    70ecf32f351c72bea754c6998f54e9758907fb70

  • SHA256

    9255b906667b466ae7cb5b54ee5ce57281730f77318845470d5ff226c696bc38

  • SHA512

    c1c673e84ed53e9057c20f035c71bd3234546ecb33da8a6c8dbc0dfb5585106b9fbf4013ce86aafa1e5aa7def3a432fe5ffacba0961dfc65d99f3e105fcad080

  • SSDEEP

    1536:a/BaV7B17CJ/I7vOhK2KNS8BifhDTLKkEzx:Nv7s/IzUKctfhDf8x

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Loads dropped DLL 5 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2220
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explore.lnk

    Filesize

    1KB

    MD5

    95737acaf3d7ad45f77a633370dcd820

    SHA1

    4cf36026deadc0b270ac803ff9cfef248517e59a

    SHA256

    58c19ff73a30c44b6b4b349451e42cb4b9a0e642fc649d7e6850310eae956d1f

    SHA512

    61c42456c258822099360ff88cf13e2da8eb62da2b598f37a026c409449a6d0bef36d15de64b1e4d9ab87a0f9a59c5e06d2117de7e2f43a186b5c7a6161c4f4b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explore.lnk

    Filesize

    1KB

    MD5

    e9245497ddb937ba761fd9673c6dc155

    SHA1

    a9a38646770ff0f8144329cc98e9efe47de9583f

    SHA256

    6190b851ebf8613945faed4a5439e5776a6910d0ce51097045ec7aba68bb54eb

    SHA512

    315f87a05b77054708687a2484f924e8b0d1fd204bdd7cc194f8eb38c1e75bf67698ac216004d3ab563627ba328e8ef8c55e0b96c0c05880edff1f8c72d2ca71

  • C:\Users\Public\Desktop\Internet Explore.lnk

    Filesize

    1KB

    MD5

    8860de15dd91df20a60ff07c978a14cf

    SHA1

    8cc5b1cb764eae57f24aa7c5c207084dc5e70311

    SHA256

    bea0b13f418a8dae24f70af90b93b2ab0ce013fe8c3b01cc0047c8308e7f5253

    SHA512

    38a793daf63ae5cce6adc05b4cc5842cc59e161b13785cb3d55ab446cb7fa6d74584a8968b72251e3298e2545d58ccc5499586f87a01f6b33746136748032cbc

  • \Program Files\Internet Explorer\IEXPLORER.EXE

    Filesize

    18KB

    MD5

    75841f234d770b70f4bfdf69c6e545c8

    SHA1

    2f1c96faa3ecf8288c36ffbc4e3605806c6bef74

    SHA256

    2a38c06f76019cc1a411c2c84e06864942e3c2ff04e2daed50cbe509edabe36f

    SHA512

    1314544ace13fe728ca9a2b247eb0bf157edbd624efe2de534d5ae0783535720e186364c805882fa5d0a2720b9aee06652f65dd1b4bb6bb846951346b1b3fa62

  • memory/2220-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-6-0x0000000002A00000-0x0000000002A05000-memory.dmp

    Filesize

    20KB

  • memory/2220-27-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2864-35-0x00000000029E0000-0x00000000029F0000-memory.dmp

    Filesize

    64KB