Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 14:12

General

  • Target

    edc2bfd48c5ae0cf93fa992ef6f2e8fa_JaffaCakes118.exe

  • Size

    262KB

  • MD5

    edc2bfd48c5ae0cf93fa992ef6f2e8fa

  • SHA1

    7e141a91d410aaf3999072222fa97e6b26ec51cc

  • SHA256

    8b14fd7fd075604e95837754cd7111494433edb739b1df69af0cf3b7e4c451c6

  • SHA512

    5b0b138719afcf6edb4013801a1aad31c4363acb065794315b0ca571035d2a75272fcf4742a89ce7cfefbb999562ca621beee6a19b7d1482fd8077dce029d558

  • SSDEEP

    6144:OuFUFZmDNcjypnMtiQPP26p7hSnzh1FiPIVN6J0CInx8SmoS:9UF8ejyRMtiQPP24Kzh1E4Nu0R8SmoS

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edc2bfd48c5ae0cf93fa992ef6f2e8fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edc2bfd48c5ae0cf93fa992ef6f2e8fa_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\WXYSEO.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1624
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • System Location Discovery: System Language Discovery
        PID:2788
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\zeHXG.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Updater 3" /t REG_SZ /d "C:\Program Files (x86)\Firefox.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2140
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\KqhJZ.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Updater 3" /t REG_SZ /d "C:\Program Files (x86)\Firefox.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:600
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\bNrlM.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "Explorer.exe, C:\Program Files (x86)\Firefox.exe" /f
        3⤵
        • Modifies WinLogon for persistence
        • System Location Discovery: System Language Discovery
        PID:2316
    • C:\Program Files (x86)\Firefox.exe
      "C:\Program Files (x86)\Firefox.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files (x86)\Firefox.exe
        "C:\Program Files (x86)\Firefox.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1288
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:572
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Program Files (x86)\Firefox.exe" /t REG_SZ /d "C:\Program Files (x86)\Firefox.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1004
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Program Files (x86)\Firefox.exe" /t REG_SZ /d "C:\Program Files (x86)\Firefox.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2328
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2916
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1964
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-easy-nosttings.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-easy-nosttings.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2980
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-easy-nosttings.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-easy-nosttings.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3044
      • C:\Program Files (x86)\Firefox.exe
        "C:\Program Files (x86)\Firefox.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Firefox.exe

    Filesize

    262KB

    MD5

    8af0c75f97965a4c88c036abc44275f1

    SHA1

    e532b648eff44ef96801d40c6167ce1dfa2db201

    SHA256

    a01691a91978b8af466632f14563a8691927445aa63bd1f0453a4c65946af2ca

    SHA512

    ff4ebeab5d337df763d5dac05d3cfa4401ffce68199e99e9e32c0ee89b27068b7f4e9ef22b7aa6e6e2cf8d426d72bf52c1642baef7be5262c78870386d4f73a9

  • C:\Users\Admin\AppData\Local\Temp\KqhJZ.bat

    Filesize

    135B

    MD5

    caf13b6972a1c7cdf69f4328f8d2614c

    SHA1

    52632bd66a66e5c3992724386a51f6243d03ca9c

    SHA256

    d607c2f68cadc4892a8b639c0bd7df447671272e162e159a1a595acb644546a6

    SHA512

    5c7130ef3edfd11c95a472cd77d41933aaa08fa995e8bb3793cc687a7e6721643ed5e900e7793db6207eb365301e0320e3d385a2aae143492453f20288e4733e

  • C:\Users\Admin\AppData\Local\Temp\WXYSEO.bat

    Filesize

    256B

    MD5

    7eb60f757274d9ed6717c032649e792f

    SHA1

    4d5c4393d873beac1146ed339f4b8eae998ad3af

    SHA256

    68ca300bbd70b8b3dcd3a2b545507e239bb1433225bec850e2e5bb528cf8ba5f

    SHA512

    11b72166cca51371451dd200df88c699569043a69123b7f4d1187d19f8815ca8a5ca112b7565d51d092a77ba7291054eeed0d51fb4d0b9443458a246e650c980

  • C:\Users\Admin\AppData\Local\Temp\bNrlM.bat

    Filesize

    162B

    MD5

    773508c41df0c7b0062dc3daa57c4557

    SHA1

    4506962fc5e9d8c9b7634c5e86d09fade7a1a421

    SHA256

    8758b920a248fa2a4e8fe694e4b27fb8c4127ce98452b411c6ea661adf304536

    SHA512

    6c47a9f918b7aee4806aefbeacc06e3bcdb753889900cf240cf972e580e0e5fcce0aebc4e52582a887f8e62b4e8565adb392a059502b5d48c92cd102df2418dd

  • C:\Users\Admin\AppData\Local\Temp\zeHXG.bat

    Filesize

    135B

    MD5

    929dc9eb3bc485bc4af2d54bf1e52ac4

    SHA1

    f76d94a0b762673e19f19772481e68200904edee

    SHA256

    e731f11348e8addbb3a07b1ca35ea29c30ff3e6c8be6a7bfc3ef4fffb0e71c6f

    SHA512

    952c406c42ea2767079cbc8f70a939745743de7ddce5f044b867d71a304d4a2c9d5b25bd83302df8ad34867740b6f78a0afecc9ceee773ac49e576b78408c4e6

  • memory/2260-84-0x0000000003840000-0x0000000003A0E000-memory.dmp

    Filesize

    1.8MB

  • memory/2260-94-0x0000000003840000-0x0000000003A0E000-memory.dmp

    Filesize

    1.8MB

  • memory/2260-97-0x0000000000400000-0x00000000005CE000-memory.dmp

    Filesize

    1.8MB

  • memory/2260-0-0x0000000000400000-0x00000000005CE000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-119-0x0000000000400000-0x00000000005CE000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-98-0x0000000000400000-0x00000000005CE000-memory.dmp

    Filesize

    1.8MB

  • memory/2660-129-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-126-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-150-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-145-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-140-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-108-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-136-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-123-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-133-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-103-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-105-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2660-131-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2864-125-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2864-116-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2864-111-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2864-114-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2864-115-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB