Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 00:58

General

  • Target

    ea4be2817857764ac3df9541f9c71b12_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    ea4be2817857764ac3df9541f9c71b12

  • SHA1

    4b0c9f4e47a72102fca25abdc58b45bd63e68502

  • SHA256

    b1eb7e0621e6a732eb4d6f68dcfc8ae863691850fe550e9fa932457d342d5ef1

  • SHA512

    56795a85db721716dd659fed3c3f13f653cc9bcdc04b7ac9bcc9643441007ea5a852b4b94fb81e55b0354b50e42f66e3cb0ffbbe9e6517d034bd052810c2b650

  • SSDEEP

    49152:o2OOenGxGipXs22a/tgrYJUGfZC3wA6EylfwEaFWM:COenWhXvttLxC3sEwwMM

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea4be2817857764ac3df9541f9c71b12_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea4be2817857764ac3df9541f9c71b12_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\minidownload.exe
      "C:\Users\Admin\AppData\Local\Temp\minidownload.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2972
    • C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe
      "C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe" /Loader /DownLoad?status=true&softurl=https%3A%2F%2Fxiazai.sogou.com%2Fcomm%2Fredir%3Fsoftdown%3D1%26u%3Db-5xxbPWjTJoeTuIzmwjONmoKoIYNgdlHOO3Q2c4MvNKh23MthGxACf3PiVhFC4_tT41M0botNsOUo5e4hJ_GEgh3kPARemdMCiEOf3AMsXxoq48ScUzhVAV_3Jtb7DO6D9JdioEH62RKfpxjLabj7frBJYGr9wm%26pcid%3D-6901483559681028076%26w%3D2240%26filename%3Dtv.danmaku.bili.apk%26extra%3D39_myapp%26downloadtype%3Dapp%26stamp%3D20211102&iconurl=https%3A%2F%2Fimg01.sogoucdn.com%2Fv2%2Fthumb%2Fretype%2Fext%2Fjpg%2Fcls%2Fimagick%3Fappid%3D200504%26url%3Dhttp%3A%2F%2Fpp.myapp.com%2Fma_icon%2F0%2Ficon_73622_1635319263%2F256&softname=%E5%93%94%E5%93%A9%E5%93%94%E5%93%A9%E5%8A%A8%E7%94%BB&softsize=80.3+MB
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe

          Filesize

          232KB

          MD5

          cf2a0b38db3d7ed2601963960038531a

          SHA1

          6f276805b6e8f413bbb5122bc79f5411e63fc88c

          SHA256

          2c0976ed88e9da6117bf52049f915e4ab6c4b67529fbc699d8d19da4099e0f6a

          SHA512

          9d9d246cc532e0feb6a4ce7562aa75844f79cb3cca261c66b3fea5b57b5324b57089b05825789b43062f8fa2de8e6370785b66c2bc4f1b7e50da1a7edd415c9b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

          Filesize

          471B

          MD5

          afafa8855d806fe62a7d16a639bc62e8

          SHA1

          d03f2f055220f3f2e6ce9648c7e9296179a72cf9

          SHA256

          2d3fe115167d7f7ac327e6fd654ec80f0d3f2c53c3e188aac233ab5a05bf061e

          SHA512

          9a2551f9927ccd090a662160c7b7dc8a7b4c084905f9ea2348db6d17d27b20e86cbf4444f4070f4922793eaf8bd9d5e28145fbeb782f90a6f08c4ab69cdfdc64

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

          Filesize

          398B

          MD5

          c03de569b7438a77feb5343a7c9192d2

          SHA1

          49a6cd3539920413ea99af878ce546b19862071a

          SHA256

          0c86ddd826c5a3ee880ea3f1152df9513eb83e1ace6804692af704684b56f131

          SHA512

          abac073ce926556522955ab37623ffb415c45606783570280fce5e721f36d6d1d1e9d25a99f961b9490011f9bd4389efbecec64b660ee3bcf7265727ceae5eb8

        • C:\Users\Admin\AppData\Local\Temp\CabCEC4.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y5T1ZTJB.txt

          Filesize

          95B

          MD5

          6a86303057d27be2a816178ab147b0d2

          SHA1

          a4d3b84fb4912f5aaf3dd3b5f289f8bae6865ddd

          SHA256

          69570a16c5ccddc1f1b10e3d9ff9047f46959c8d9e4a1e233a7c729afe18e195

          SHA512

          bdc39e8344f8edc23aab0da77627c3ff541b3d4bdb84942c5de32027b9f65639408416da3611accfe7fd0bd7a18b46a7311637a00b4c887da8989e670df7a5f5

        • \Program Files (x86)\SogouSoftware\SogouSoftwareLoader.dll

          Filesize

          381KB

          MD5

          f6f497a13a06c1ea39a9e08a5ade4658

          SHA1

          ae73159a5693bea824dbd3b14ed7a7be0e75fbbb

          SHA256

          3fc55301587449323f057f42e950c00fda7dffd71eff977a6e7b512dd2c3ff4a

          SHA512

          6c2b28ad814529e8d96b556e5639500dbad5a2702bf30c00c83334493a190c01eba0ac659d131150273fb29912235c91eebe106e8e2c926c32db489861554f30

        • \Users\Admin\AppData\Local\Temp\minidownload.exe

          Filesize

          1.9MB

          MD5

          597f9ca8500bec75bb38b4f9f6791ed2

          SHA1

          7ae4b7ade92bb564773c2375a2320ae80d05d79a

          SHA256

          1404010700bd37999d7cf75f59b4beb001b6e688cabe5c18eb449485f62ce30e

          SHA512

          5ed92095910b760065317556f680ee12c71b963ef948ad22ed6dd27a1decdfd13c415481ad2a83b83ff00d56115f886eb4e5fcd82fd59ec351f5b6d30b137a82