Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 15:51

General

  • Target

    ebabe4333bcf6cdab448796ec139a390_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    ebabe4333bcf6cdab448796ec139a390

  • SHA1

    5ff12123a229fc1a5061fdbf881e3d27bf0cc9f5

  • SHA256

    42b2d4146000d38b02bce260335bef61d3ce919910605b3994ae8720b381ea9b

  • SHA512

    5786c643f656a1565fe8895ebd8e3f976c23e01092f5bbc2b874bacda1d452d85ee97b87295f44d999a0c49ebe091298e4ea625efe48aa59a8a03de9253a9c3a

  • SSDEEP

    24576:6X6Dqx0fxofckRCeTRkL7yL7IIOPfMQACGb/LoYGHo+ALgt9:fFf6fckQo80IIOPBACQ/MYGHo+Aq9

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebabe4333bcf6cdab448796ec139a390_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebabe4333bcf6cdab448796ec139a390_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Windows\SysWOW64\EhStorShell32.exe
      "C:\Windows\system32\EhStorShell32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Users\Admin\AppData\Roaming\SysWin\lsass.exe
        "C:\Users\Admin\AppData\Roaming\SysWin\lsass.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        PID:1200
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\iassvcs32.exe" enable=yes profile=domain
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2868
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\iassvcs32.exe" enable=yes profile=private
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2920
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\iassvcs32.exe" enable=yes profile=public
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 572
      2⤵
      • Program crash
      PID:2392
  • C:\Windows\SysWOW64\iassvcs32.exe
    C:\Windows\SysWOW64\iassvcs32.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\ProgramData\EhStorShell32.exe
      schutz
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\1605435253

          Filesize

          41B

          MD5

          7361e0c1b9bd14993c4873941090e766

          SHA1

          7aaaa81f9408629f41d343fc6643f0cac7a0ceea

          SHA256

          0abcdb85523e544de8fad2e6d337cb16ae3bba6fa45bfe7ada8ac9c8f6a63cbd

          SHA512

          022376a1f142d8a09867b81423386dda27ae4f52702f79a270b8ae6d69a6f1919c7dac6d9d2f59623b8fc2c9d2fd6041dbf8c698757fb2bc4c1c5af70b2b7331

        • C:\Windows\SysWOW64\1605435253

          Filesize

          129B

          MD5

          5b4f97b55f8613f6b82c17794ac61445

          SHA1

          84247c69edd486070042c223cac27dd5fb4b5297

          SHA256

          a7a6906a823f044860fed9e6df78b8d8b15bc095ea08f2570049244584b4f4a5

          SHA512

          c508bc6b5402bae7d2c1b20b11acbdca9925643720eca73c9899e7a139c64c678a359ce0730da6d46a482cde8c7f03723fe58a22e4fd8ac6047209734c8ad8e3

        • C:\Windows\SysWOW64\iassvcs32.exe

          Filesize

          1.4MB

          MD5

          ebabe4333bcf6cdab448796ec139a390

          SHA1

          5ff12123a229fc1a5061fdbf881e3d27bf0cc9f5

          SHA256

          42b2d4146000d38b02bce260335bef61d3ce919910605b3994ae8720b381ea9b

          SHA512

          5786c643f656a1565fe8895ebd8e3f976c23e01092f5bbc2b874bacda1d452d85ee97b87295f44d999a0c49ebe091298e4ea625efe48aa59a8a03de9253a9c3a

        • \ProgramData\api-ms-win-core-localization-l1-2-032.dll

          Filesize

          247KB

          MD5

          a3742330894728d2ff5177a32b04b166

          SHA1

          c462b3821672c610e2b9262445cad369ee274da5

          SHA256

          64abda05fe3866f57e658c3742167f79a25d252a5235778db868a70b55280b3d

          SHA512

          464ff71a1adf2e80d3768e448e7970966ad0f892315f2c059b0df55809b14eb3ae5cff638ec597dfc714234add8d373485665a75d68218856296e9f1ee277e70

        • \Windows\SysWOW64\EhStorShell32.exe

          Filesize

          203KB

          MD5

          507af5f955490f0a912010466326865b

          SHA1

          2af1cf8da7e28ac1a0838d91bf68af6658ac25d0

          SHA256

          dc42bb982b74b0b63b844e09507e0bdecfadaeb14411137c2f12e5ea9efab721

          SHA512

          41ea11d54fa08013985445cc6f77ca3c67beba0b9eec5515f906ef653809f8fb3773cb9379ed7e252e4ccaea31f0c6edd85bb97b146e0ce27aed3403859fe0b5

        • \Windows\SysWOW64\api-ms-win-core-localization-l1-2-032.dll

          Filesize

          435KB

          MD5

          67bb1544028be7c717089cc0ccccaf82

          SHA1

          dac9dcab26818f6f796f8b3800076fdc58879c05

          SHA256

          d978c1f6ec71ebb7d0f49a9ed230d1c0de2581af555c4513734e86b2fb83b73c

          SHA512

          bb8fd00802e269ad90ebfb72908c77a30e003f221c5cc45242242cae6f1cbe02d63971ed273d74aa641cbfb2cc45d468329992680c051cef698e2b75b33dbdf7

        • memory/264-5-0x0000000000570000-0x0000000000609000-memory.dmp

          Filesize

          612KB

        • memory/264-85-0x0000000000400000-0x000000000056B000-memory.dmp

          Filesize

          1.4MB

        • memory/264-6-0x0000000010000000-0x0000000010081000-memory.dmp

          Filesize

          516KB

        • memory/264-0-0x0000000001E60000-0x0000000001F64000-memory.dmp

          Filesize

          1.0MB

        • memory/264-1-0x0000000000400000-0x000000000056B000-memory.dmp

          Filesize

          1.4MB

        • memory/264-83-0x0000000001E60000-0x0000000001F64000-memory.dmp

          Filesize

          1.0MB

        • memory/264-84-0x0000000000570000-0x0000000000609000-memory.dmp

          Filesize

          612KB

        • memory/1200-89-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1200-82-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1712-88-0x0000000000400000-0x000000000056B000-memory.dmp

          Filesize

          1.4MB

        • memory/2316-32-0x00000000003C0000-0x00000000003EE000-memory.dmp

          Filesize

          184KB

        • memory/2316-77-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2316-33-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2928-87-0x0000000010000000-0x0000000010042000-memory.dmp

          Filesize

          264KB

        • memory/2928-86-0x0000000000400000-0x000000000056B000-memory.dmp

          Filesize

          1.4MB

        • memory/2928-42-0x0000000010000000-0x0000000010042000-memory.dmp

          Filesize

          264KB

        • memory/2928-108-0x0000000010000000-0x0000000010042000-memory.dmp

          Filesize

          264KB