Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 03:33

General

  • Target

    eefde0896c38953d97338c9be9c989c5_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    eefde0896c38953d97338c9be9c989c5

  • SHA1

    8f60fb6bb8d8f591d35f646fe8034bb1f25cc5c3

  • SHA256

    c66d52bcf29db1ff263f01381f2da1fdb0e582b69227a0f43de6ec251aac47b6

  • SHA512

    ebed225526cdebbe8a67077090bbf50c97016743d8c992e5797644776423d1fe84464686d2a9a5ea5e570a07eda712fca92e480f38b650a3db1f94225a7ac06b

  • SSDEEP

    24576:4d33RjEptwxaf4mqVlb2mn91c91PzdOUfoZgTVuxk1G9Pyed5iTKXUg5N:G33RjEptwxaf4mW91c91Pfo2TV0k1GZB

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eefde0896c38953d97338c9be9c989c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eefde0896c38953d97338c9be9c989c5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\reptile.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\reptile.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\reptile.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\reptile.exe" c:\users\admin\appdata\local\temp\Program.exehµßt 
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Windows\csrss.exe
          "C:\Windows\csrss.exe"
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Windows\csrss.exe
            "C:\Windows\csrss.exe" c:\users\admin\appdata\local\temp\Program.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Adobe\caps\caps.db

    Filesize

    26KB

    MD5

    8fdf28dfd592f2a2c8846f83f73390dd

    SHA1

    18be2802d2c76be9ea9a5ff4c086fbbafa4599c3

    SHA256

    6c9a0169d1afd716897488cca76182efe0fc624b46fb5a41c6e23270d296d829

    SHA512

    53a8a0867e00d612666885236c391246bacc4fbd2ea0a713ff38cd6c783db00273bbd462cc069875a8b0ea1a59ff4b28d1847d796c8c8e70fec68840016f38f3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ahmbed.gz

    Filesize

    221B

    MD5

    6d7052a1b26813ab81bd4b5b421185b7

    SHA1

    848ffc98d1a355ad825060b123c654aa06b28bd1

    SHA256

    c7e1475dbf7d8b5ef96a5aaf42450862bcface9bb3292cc68da64f5462987a22

    SHA512

    40cfc3a9398a8329685955d5e108f52304415b9bccadb36ac4b6d8284f8cfa11b263666c8a6b9f7ad899a2fefd65d5d90ad61300c92ed4b68af03e57ba037747

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\reptile.exe

    Filesize

    92KB

    MD5

    cdb58de65a54f38f3e46c6de55e1a373

    SHA1

    1bc4f6cedcfc0099dc05afcb92fba8d22ce7389c

    SHA256

    9411c2ffa962afc5302fb79476f6d2a4f8c75e81cb0d6784b5074d5b172b97f6

    SHA512

    53ef1b8dd938dd2e90eb937541f4d994cb295057d6eb2665ec7263fd43c0ef84b663ae920e1718c38d0695a7d37eab62a40306d849b2e48bba2d5c436bde3808

  • C:\Users\Admin\AppData\Local\Temp\test.htm

    Filesize

    3B

    MD5

    6057f13c496ecf7fd777ceb9e79ae285

    SHA1

    7f550a9f4c44173a37664d938f1355f0f92a47a7

    SHA256

    fa690b82061edfd2852629aeba8a8977b57e40fcb77d1a7a28b26cba62591204

    SHA512

    0601d109d0d2b0fa9c4484b4a5c94ee5ecc62ccec3bd7d99e972d18994d0e2e42f6d0fcfc41216a5ab72ee7af96d213e1c314abdde40f52731ff24c2bf8f7323

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup.exe

    Filesize

    2.9MB

    MD5

    ae591cef7a3ec455f3742041ce6c8b46

    SHA1

    7b634779c128bf8bb5658166dcdb3dc60b7eca5d

    SHA256

    cbe0ed650456afa91e9e30689a035ff730751a80da541fe634abcb0c1e383ea4

    SHA512

    720686d002250bf4e7faa0240025481e4b18811f873ca1492e0bcfda599ad1497bea719d530d98f08c6edb9fccfe448f716aa5cd200664bc29d4a636c08a3254

  • memory/780-30-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/780-28-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-26-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-24-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-34-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-58-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-42-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-43-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/780-37-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-81-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-106-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-101-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-102-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-103-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-104-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-105-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-77-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2748-107-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-108-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-109-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-110-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-111-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-112-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-113-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2748-114-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB