Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 04:17

General

  • Target

    04576b7a014c6acec68b3f4a227cfb62_JaffaCakes118.exe

  • Size

    772KB

  • MD5

    04576b7a014c6acec68b3f4a227cfb62

  • SHA1

    88e1edb9b1a26b76fcb3680f38e67df7f18b660b

  • SHA256

    3936e2b4367d153f30faea901bfce5f3b362d1ca8b38a395735f73301a4982dc

  • SHA512

    18a1f70116dca66ac69364c48ef7e6e612c1f569ebc4afd67bc37a824810c1ae9c617452aef57f44216969e786a4d08f8b6f5dca65895e8a73a2908fb41e264b

  • SSDEEP

    12288:9XeCPMdwydEJNFZrmEHsNMitgSqNqDQ4GOoeaS5HDH6V:9XpGjynZ6EH4MipnQ4GzeHT6V

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 51 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04576b7a014c6acec68b3f4a227cfb62_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04576b7a014c6acec68b3f4a227cfb62_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C schtasks /Create /F /TN "enumerategt" /SC ONLOGON /TR "'C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe' schcmd" /rL HIGHEST
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Create /F /TN "enumerategt" /SC ONLOGON /TR "'C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe' schcmd" /rL HIGHEST
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2664
    • C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe
      "C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe" Updatecmd
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2776
    • C:\Program Files (x86)\enumerate\gt\enumst.exe
      "C:\Program Files (x86)\enumerate\gt\enumst.exe" Updatecmd
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2908
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c \DelUS.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\DelUS.bat

    Filesize

    228B

    MD5

    2f7d6e64573ec70030498e9969325fee

    SHA1

    f1e092b089b73d1259e66f3167b6576baea8c5ba

    SHA256

    4d5f49940a6b72280f6f4237e402bda36e23d95963de795b706c2f5931ba8591

    SHA512

    e6e57e0a7b6f0786b2f22476804f99fedd5520ca6942f70ee8b62291c1db08977cffa6e5bce285342878b662682940f82229c52aabe233a1c35ea4733fb59c55

  • \Program Files (x86)\enumerate\gt\enumerate_gt.dll

    Filesize

    208KB

    MD5

    0dacbcaf284cfb0f11b60f191f90535f

    SHA1

    97bf9d11e479f35e284d1c1d7043200036c08cd7

    SHA256

    dea16761751ae38e3f4f1861f4211c9700d5921b5c5519fcc5466f096e31f670

    SHA512

    274cb9c7f5871474235ec9b30af727d0ebc5759071d66b6295f3f0c9c2de16102e1f980f7ccb02c50daeb7464c91c51b124cfe2ccc67efc977f3627490afc26c

  • \Program Files (x86)\enumerate\gt\enumerate_gtu.exe

    Filesize

    956KB

    MD5

    ef8736ba45eb1248c9809136ca3c4b7c

    SHA1

    7fd63e869937785bf0caf0c7d64e5108c70f6028

    SHA256

    bc27293e97e91e44d8c928021729dd02446fc075f20ed015fd1ab6fcaed8b1b0

    SHA512

    3c4e83fa964271f538e9853a43533ba17e32811e2824b59184b797657b78208999f4db65ab61db613649c8863caa8680b4c78ffc3482127e14d3132c0751c27b

  • \Program Files (x86)\enumerate\gt\enumst.exe

    Filesize

    1.2MB

    MD5

    cb7c5835e42807f7a83d082e4402059a

    SHA1

    abb037e995dbd0de63daaf4ae7b54a1f6b4d4f44

    SHA256

    958b1b2437e6c16aae901c0d011b7d14973d3d5c3680568c70725a384b2da0f5

    SHA512

    7b80c908bbba69ace4fcd9aff8c59a7300e5d1fdddd24a1a412dfce9a959f5bd59ad3e4337ba4ec5f5d0ce53572d5ea235610aabd52455fbfb4e5801ee88f710

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\DLLWebCount.dll

    Filesize

    32KB

    MD5

    248536afcb6f59c1797f079a0da15b63

    SHA1

    7fa238f871b357c66168728ab1bb38addcfba3f8

    SHA256

    9c5f4eeadc9c2881bc02b45d757b35d3bfd2dc7d917d2e8fde2917fabf48908f

    SHA512

    b82accc8530650ebae8d4f8752002c2d23ab7b29e958e6c14731ad186a0fcdbbab937723a540de62d58f4659580843191fd53cb415e07167d7b55cd174a79652

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\IEKill.dll

    Filesize

    28KB

    MD5

    090f0ab18996feae6c0a62d83b2149c6

    SHA1

    5292898561ad88630088ae22fb877dfc7146ee77

    SHA256

    914536dd97645de7789666da5dc03d02f4fbe0593214678e6e1982a02a8a1c4d

    SHA512

    2fccda2cb95583fdb184b7edaa7ae088ca484e06d020159bf9776e36b660c6672812b7e821b111fa52d63ad5e2ce70602dc117edc2eba3c46029653c5ef5ffc6

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\SelfDelete.dll

    Filesize

    24KB

    MD5

    ddc0d6806073a5b034104c88288ca762

    SHA1

    9663cc10c496f05d6167e19c3920245040e5e431

    SHA256

    2f4767da9dc7e720d910d32d451674cd08b7892ca753ec5c10b11fe85e12f06b

    SHA512

    545ca797a397cfcbd9b5d3bd2da2e3219ba7a294e541831655c5763a7f17480fd0b990d0c2e58ba8c71f81d85472b2da6d079b8211b44c40c8c36d21168ec054

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\UnProtectMode.dll

    Filesize

    200KB

    MD5

    d37323d733078a8da425ad71a51d1462

    SHA1

    7061f1f388c6fa0159d614ded01251da4e4b7e4b

    SHA256

    e1a0b1168a87ac0d140b3a394efda23148a8907093898e0a2549079009d318e3

    SHA512

    f7e0780aa18785c1402d7233b67fabb61cefa8568e71cd4ca37405eafc7a340053836b16fdebc2ce351b7ddeac28d17a43091904ba443269cac1e7e4f46bd929

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • \Users\Admin\AppData\Local\Temp\nsd81BF.tmp\version.dll

    Filesize

    22KB

    MD5

    fbe588b15eb1bd86defade69f796b56f

    SHA1

    2f63cf44039addddb22c2c0497673b49e6b3ad7a

    SHA256

    31144e8b156fe87317073c48a09abcb033fda8dbdd96986c4abea8c00c00355f

    SHA512

    e1a9e29e4c62e77a2ec2c539344f0b5a8cd67ca3fd8dfefb0b0666a992eb2fabadb0034d439c4adbbdffd9c9439f23ee5757fac0ed669d3c9db48f50c677143d

  • memory/1640-58-0x00000000005F0000-0x0000000000602000-memory.dmp

    Filesize

    72KB

  • memory/1640-53-0x00000000005F0000-0x0000000000602000-memory.dmp

    Filesize

    72KB