Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 23:22

General

  • Target

    f0d0e641fa67338d491c6fa5a8ade01d_JaffaCakes118.exe

  • Size

    753KB

  • MD5

    f0d0e641fa67338d491c6fa5a8ade01d

  • SHA1

    ad94af657ebbecff944f4e1697d1d9a52f141846

  • SHA256

    5578421f95c2c11168bebad9255652578a8ece9f468e60534fbd43d4223fddef

  • SHA512

    6976fab051a680813680ac7bf3e40a51cc596ae6efac80cdf6ae6ecb9e2c8424a3333fe15ba443699c10ec0575fe6c3130d42bd6e23e52cfca764282bdb293d8

  • SSDEEP

    12288:tpr0l2UOGhT/vPgTIRGbfzm9UdlnONcAc1dqmMfpE4E4:7rA2tGpPg0RALONcq

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0d0e641fa67338d491c6fa5a8ade01d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0d0e641fa67338d491c6fa5a8ade01d_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:988
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2724
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:6763523 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3056
    • C:\Windows\svcr.exe
      "C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\f0d0e641fa67338d491c6fa5a8ade01d_JaffaCakes118.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Deletes itself
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
            PID:2360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      06148c511ad00600a2b3b307a64b2dea

      SHA1

      10b2dee3eb3642956eb505d236fc85c80223982c

      SHA256

      950303787332354154f4e4ede235258edac364917a7b1871de2a554448ddab2f

      SHA512

      07dce9939bf083a81d636e5874edec9a450f489a983218fa7e8e0dbee3ff48b1c138028af3e995c54211da6fcf0cfd5e1f31a6f34847d8df1fda35f99ff1230f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7b153b1c406d2bf7a50ec93181418891

      SHA1

      c9c0b59f61921d1d3095bd3b49358b32c7ebc2a6

      SHA256

      3fcd7f8a4ccea2df64d6446af2cdf350abf1d32d77df9399f0935583ced51e72

      SHA512

      9e268978f87712c5e39789634a16a07290077848a87ea42f291bfcc1c0e1c92a05a3b521bf6e98edaa04da9c08ac546cf2a0876388c0089edbad7296c39bc35b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0a0d0fd239d9b83f6e71fbc0c7ef76a4

      SHA1

      9dc64620ef2ef575cce6e68949e449a671a2b786

      SHA256

      3b52fb3214713bbf784776f5519968630547be737b680f4cdbb16bd467f31618

      SHA512

      534c1cd47bff11cc524295ab0cfd3adb128b2ebb8470bec6710f7cdfeedcbbd60376deb1c25cc7061c3485426cdbe735d070ecf03be32552f76702062c9e4b04

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5676f07c3df4b310db0e4474584024cc

      SHA1

      307eb66e8ad298cd72e149346a012aff93b37a6e

      SHA256

      8a2c1f2fcc2a2c3e60b1c384e829c348fedaf50927fab733562f4d021c5b43fd

      SHA512

      d752288310a65372200400402035a2e617722071976ba57d8cf8ffeefef3dd651f681a1c55dc90142ca22fd91a1cbea1128e9abafc812e29316d0253968106c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7c676c85b44f5b7c3b8fa34372ee4216

      SHA1

      d011f9357813131f60efa4d2a30fc9dee05fe664

      SHA256

      70910e47f339a78f8e02b8ab488010430bb990e965008539c027f907673d2e94

      SHA512

      3a1ee1fd50d3c8ad7635c18ce9f014448bd6dfd52915d47519ac6a24cad2b0408776b70d0d638f61390bb80d204c56c15a6db7f3c65ba9f9a8c7be469822cbf4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f4ab09088e66338fbb8d92a2009bbaa2

      SHA1

      176309ac53f33aa3f5542d062f183ffb53b19c21

      SHA256

      a0f36e3afe17716306dafff4a310a62328b742e519171ac7a49eaca1395fbac3

      SHA512

      ea207bde64e7b55ef3777f6129d09114b229f1297986b4e79edd1157cfa55a51e6924c1d7f3e83c96e0a4c293e358efdecb53eb195d049d89227131d58704aee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e8eaf2d462ca1710e5df68420411efd

      SHA1

      d968e151319f227b92e5c36fd9b4bd90ead1a6ea

      SHA256

      844f19cfdcdb63d8d02ee8a0ad3dea400c1af0800c970ab0d698492a426d8500

      SHA512

      5064d61e06ac4c11eae8e64fa2c2dde40cfe31febe813acb393c886e290dcf2e5c493544942dc15ef14d6eefab92a39ca0f8a21d7f49dcd9986cb5e7b932fdfd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      50c3f7d586f331ea4d727a29d33fb560

      SHA1

      1c8eccbb35b211769063bea7a914cd26b7b91913

      SHA256

      26589fdc9e2452931fbc67f01966f9b3f5a1776ddd0afeca95a113fcd940e8a8

      SHA512

      54d82f83829391c1bf92cb14b65113eb9a9a637b81d83f147445964d81dfc251ea9ed14c05adf7ccdd35737fbb1c6053ea4255157becb8cdbace1885d9451a53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f20cee8a1af456057a05c525607df836

      SHA1

      7935cb6a2ff0536c41799b01c14bc777dade44cf

      SHA256

      8e7c62bd75d3647225d28edaf3b3f97d1b62f5743651592b1ea98272d0ebb4ef

      SHA512

      58e41bcd1e64277ffabcad882b8ce09d54f304c1ce3832df44023e47ca3d3fe97cb2ecb4c1ec80dea8e0c277555670de7771c6fc96caa4f47c2849f20fcc73ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f482714de9ac32dd4a8ca9bad6b5ec8f

      SHA1

      d31fb041de9dc596048f7823f1a28cad178c5bca

      SHA256

      9cff061ee1d77a8f59f7df7f9c9c824c5f668af16e4e90f942ecce150481f9e3

      SHA512

      9925c5a4b8dbd1f5bf7fd9903e107b7a87e331b46b956360233541f9c711c084ede842b1d9a3f33371b0a0d73258002cc80f81ae9e62539fa6e51f3f5bb75554

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e17d1fc51abfc633b850782c52b75c01

      SHA1

      e7ab0ee791c01303f523a7c3420cb431b4f16b96

      SHA256

      c6f89187dfae5ff2d9f88f14c198ef6c18215b44a2e4c5b9f7f31f637fa52c0e

      SHA512

      b6fe08834fe8fc60f5839b9d3067fb44a221538d4ef7129070308daedf6767f0774a5db1e5b1fe92909804f8b337b476a99c7c83ba8285c1b4556dd1f3a65253

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e697025c14f725b71ec5db3e9cab0568

      SHA1

      384644f3b83378678040395faaf28a0d503a5191

      SHA256

      2965e842b09c3f456fe79f9edc0ad4f01e81375b20187c0295515e6950b3ade0

      SHA512

      ffc114cbf00e42f577d23381c182ad37fb828ba47441742f834e38ac06f8b9814bdaad9f2912a04f486b372221306045f49eea1f1bc1a4d6872b299f99b623c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      900c6a506d60eea2910cdf912bee3c0f

      SHA1

      57db3e3d33f15ef55567dd8b5aa35ecabe520079

      SHA256

      4f54d2018d3b2f3be9a9410246f5bb700f1575f95c525f0bb693989d2738894c

      SHA512

      75286c6efedc45b584dd8fd8a54fb66af5ddc53bcd2e692e064f21ff35930bc3d02119cf878795712b5a66b548ca69d087444e577806ddd2ef22714b33833a3e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6543dab1acc702d75314eeef400bace6

      SHA1

      e6b514aedee3900655b3526c0299de08d885ae6c

      SHA256

      b8a64fcb8dcdb5686380a16b8e93788e991960a16513142cb990913e64d46125

      SHA512

      c73d467265b69a531a056275b7380881f8c67d6f07cbf0d984b39765b440cd1d3d7d3febdd002b91149b0a8809dc877450ca3f6437f2eed6b95574db9cd128d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      590ecef5fbc00db47399c4f469bc5f57

      SHA1

      466098e722088d5492096f68ffb76bb91f531a2b

      SHA256

      bb13e2e13e706f5aece22f87443f73e2da469fd05bcda8931048bd422a5883eb

      SHA512

      e86cd05800609afc79d270eacba4fe4e7ee5b0607c9fd3bc65a54c9d6b2d3899af862aeda4731eb1e8d043e6c4347bfef036aabb15238c86afaa4d6eba576cc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4ee244e548457d23ff5565e86146bbcf

      SHA1

      4fec1751293c0016d11990912074a84880c764d6

      SHA256

      608c702fd3b08ec52e4364ccb2f421e049dcbcfe5dde29a6d4c7c3a9778b1001

      SHA512

      7ea9407eff7956123071807140b93d03c2ae16638edf8532b9afb17505e7fe76f63dfe8e9d6a9286168e0081c6d45587bd764786834547ff8fbb73ed7f69757e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0d5ec89755bc528685b942c1ec581d30

      SHA1

      78b9986f7c41f59ebfb46407d90e74ec15d77366

      SHA256

      d834e20c813f0d4223618b80b9b4d639c3b87f4e08966c14caf4c5541158ea26

      SHA512

      d30acf7438512fdd138124a95d228027cd315b179c51d99de990fefc722385a231b0fff2c0a39c1b95a3ae8cac3b1d21ff4378676f9564e4e10d26fc2b8f1003

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      94aa76dbed8265aeed8281e99db45124

      SHA1

      37c76e8b29c36b34bb8a0aca372596e7da149f20

      SHA256

      431ca488699007dd1043b32603430b6b06337a5aae6985c87a1a6c5ae2dadf4a

      SHA512

      575cc1b27073d739bb6b970e8920c726d753e8368298c3940e64f3bada05cd96f2b54f66f9310521a9ccfcdd530b7ecb8911af453f198350c6bafb2db1e61240

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      179166ae3d97193e1b17d4b260d97f3b

      SHA1

      e5433c97381dea8479f7d17093e6d005040c6eff

      SHA256

      80512c4faaaace34a81b7356c219a44b5a445472656f512005b6a23a2cdaa629

      SHA512

      e4b38cc55c6d7140d466f25b5daf345784fedcc58820ba9f6fa663b34978b6007f3d3998e1a915f5fbd0f2c8e23c589ac5d6b3df63477cb83f4019ee006dfc07

    • C:\Users\Admin\AppData\Local\Temp\CabDB53.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarDBB5.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\svcr.exe

      Filesize

      753KB

      MD5

      f0d0e641fa67338d491c6fa5a8ade01d

      SHA1

      ad94af657ebbecff944f4e1697d1d9a52f141846

      SHA256

      5578421f95c2c11168bebad9255652578a8ece9f468e60534fbd43d4223fddef

      SHA512

      6976fab051a680813680ac7bf3e40a51cc596ae6efac80cdf6ae6ecb9e2c8424a3333fe15ba443699c10ec0575fe6c3130d42bd6e23e52cfca764282bdb293d8

    • memory/2884-16-0x0000000000400000-0x00000000004CB000-memory.dmp

      Filesize

      812KB

    • memory/2884-17-0x0000000010410000-0x000000001042E000-memory.dmp

      Filesize

      120KB

    • memory/2884-26-0x0000000000400000-0x00000000004CB000-memory.dmp

      Filesize

      812KB

    • memory/2908-1-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/2908-0-0x0000000000400000-0x00000000004CB000-memory.dmp

      Filesize

      812KB

    • memory/2908-14-0x0000000004EF0000-0x0000000004FBB000-memory.dmp

      Filesize

      812KB

    • memory/2908-13-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/2908-12-0x0000000000400000-0x00000000004CB000-memory.dmp

      Filesize

      812KB

    • memory/2908-11-0x0000000004EF0000-0x0000000004FBB000-memory.dmp

      Filesize

      812KB