Analysis

  • max time kernel
    145s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 05:10

General

  • Target

    fddb8b56a01dfc7b2f20db5ae8c6afa7_JaffaCakes118.exe

  • Size

    654KB

  • MD5

    fddb8b56a01dfc7b2f20db5ae8c6afa7

  • SHA1

    53a3b37818847340a7c1c4111dcb4510f5bc9060

  • SHA256

    b5457332bb2f8d2d2658b2db158f0ed12af8e4502c76e0ac717f7313d13fd8ba

  • SHA512

    c85f534908af034cfac24bd102479d473ef49ab454c6d04cb82c3c22278f75f9224a29e889e2335d3ae98b915563e30bc91d489dd85fa2d850606b722a4ab7f0

  • SSDEEP

    12288:QOazeZYFBIuY8ldJ2su4+wVeWuXJ0kkw+dqDRhXzN/I3aSu7+RiF2obD1Y:D2FhY+d/on5/F+dqR/I3aSu7B+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fddb8b56a01dfc7b2f20db5ae8c6afa7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fddb8b56a01dfc7b2f20db5ae8c6afa7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.exe
      "C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.exe" "C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.dll" 1342495222
      2⤵
      • Executes dropped EXE
      PID:2164
    • C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.exe
      "C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.exe" "C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.dll" sayeyagez "" dafucoti
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2720
  • C:\ProgramData\ResultBar\resultbar123.exe
    "C:\ProgramData\ResultBar\resultbar123.exe" "C:\Program Files (x86)\ResultBar\resultbar.dll" emidafuco kevivaceq
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files (x86)\ResultBar\resultbar.exe
      "C:\Program Files (x86)\ResultBar\resultbar.exe" "C:\Program Files (x86)\ResultBar\resultbar.dll" cajozura wufeyakilo
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.dll

    Filesize

    564KB

    MD5

    78a214f021ec9350231d6e6897626a43

    SHA1

    a193bfa081bae83b9de7bf8587015e56d7dd21ec

    SHA256

    ad3b50427a57326cfb9cbd3f9e2f998dbe6592b37139f32081845b2665495666

    SHA512

    2c2b97fc70b077b5d81fa37c8cd40935c858e053226abc6e1e76387889af171fd5cf03c18a2348766d67c90035922b338ae3c56349de39822b6c008abe51b4b1

  • C:\Users\Admin\AppData\Local\Temp\nstE1C9.tmp\uninstall.exe

    Filesize

    82KB

    MD5

    c78dc19bab9bcb490d031ccca4bdf853

    SHA1

    f40960a41ff93fdcad2793f36fb5437db93b120c

    SHA256

    a743fab26fad94ba571933471af4685660a80c73ef4a86ea276aebcc197b2600

    SHA512

    da9f21b7eb01b3350614ee912f98389e209e0ce0afed08fdd13bea153f28510a2aeb468c10bf3317e0fe2716af9d67702996a8cbf18eb3ce1435be68c722abca

  • \Users\Admin\AppData\Local\Temp\nstE1C9.tmp\resultbar.exe

    Filesize

    48KB

    MD5

    dd4be76eb8e2dbb337058604ea25c57d

    SHA1

    6f0d8746eaf2d2258b86b7301c9a9928e807a541

    SHA256

    915228f7184e3180ba59a9d282e017c63fe3f7d0e34f7a9786ec0698a60a5019

    SHA512

    188a318d0a28b6089388aa26e72e9432aed85d96e4a047ca78158db59c99c0a09c9966b5c5d29def0048ddeac8cb409f0db08a2b8148634c14a950c68efddf5f

  • memory/2720-24-0x0000000000480000-0x0000000000502000-memory.dmp

    Filesize

    520KB

  • memory/2820-36-0x0000000000410000-0x0000000000492000-memory.dmp

    Filesize

    520KB

  • memory/3048-56-0x0000000000460000-0x00000000004E2000-memory.dmp

    Filesize

    520KB