Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 15:53

General

  • Target

    0f792c34e7da3678633810f7afebf6e2_JaffaCakes118.exe

  • Size

    233KB

  • MD5

    0f792c34e7da3678633810f7afebf6e2

  • SHA1

    e39ebf2907b7ebbc81d80e51128a0e2e441590e6

  • SHA256

    f5bd53696898e140d8149b52c68f1d98f6270ed68f268ba06f30eeea99c3bb81

  • SHA512

    a3c7cf0066f3c49a9c72468596a8b361ddbd92e2b0dbce5f3681e39a852fbc00b3d868b58237943c5c9ed4825ecb558f76c590bfa903e8ba6c7acc99c22b810b

  • SSDEEP

    6144:6XypUQ6cDCYKfyVsoxsfLThNvbvAJbshAFJMg:MUUvc+jWxWLTbb4J1

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f792c34e7da3678633810f7afebf6e2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f792c34e7da3678633810f7afebf6e2_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\hdwe2y7.bin\02126517CD4.exe
      "C:\hdwe2y7.bin\02126517CD4.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Users\Admin\AppData\Local\Temp\PLpFB9E.exe
        "C:\Users\Admin\AppData\Local\Temp\PLpFB9E.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\PLpFB9E.exe

          Filesize

          3KB

          MD5

          29090b6b4d6605a97ac760d06436ac2d

          SHA1

          d929d3389642e52bae5ad8512293c9c4d3e4fab5

          SHA256

          98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

          SHA512

          9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

        • C:\hdwe2y7.bin\FF4460A274E38EE

          Filesize

          5KB

          MD5

          f8fcba956e8f7abaf1f8b2b97d4d8a28

          SHA1

          60094c9914656ce27dc5546f501955cb4c3e1144

          SHA256

          c644869d1d71623bbe8f90f4034cb6e54514f29983890088b757d152981a6914

          SHA512

          6db94d0b8b16087a9b735b739c6a47ce1714e0b4b7acec76fc4a5f8ab7dbc43ef3fa07dea4fc24aead7724540a678c23f6a9efb3b9d13dca7b286e1085d29a09

        • \hdwe2y7.bin\02126517CD4.exe

          Filesize

          233KB

          MD5

          0f792c34e7da3678633810f7afebf6e2

          SHA1

          e39ebf2907b7ebbc81d80e51128a0e2e441590e6

          SHA256

          f5bd53696898e140d8149b52c68f1d98f6270ed68f268ba06f30eeea99c3bb81

          SHA512

          a3c7cf0066f3c49a9c72468596a8b361ddbd92e2b0dbce5f3681e39a852fbc00b3d868b58237943c5c9ed4825ecb558f76c590bfa903e8ba6c7acc99c22b810b

        • memory/2316-90-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-92-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-8-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2316-4-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2316-0-0x0000000000280000-0x0000000000281000-memory.dmp

          Filesize

          4KB

        • memory/2316-85-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-51-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/2316-86-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-87-0x000000007756F000-0x0000000077571000-memory.dmp

          Filesize

          8KB

        • memory/2316-88-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-89-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-79-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2316-91-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-3-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2316-2-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2316-93-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-94-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-1-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/2316-95-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-96-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-98-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-97-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-84-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2316-78-0x000000007756F000-0x0000000077571000-memory.dmp

          Filesize

          8KB

        • memory/2316-81-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2316-82-0x000000007756F000-0x0000000077571000-memory.dmp

          Filesize

          8KB

        • memory/2772-34-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2772-57-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-58-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-60-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-76-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-74-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-73-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-72-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-71-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-70-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-69-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-68-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-67-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-66-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-65-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-64-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-63-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-62-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-61-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-59-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-56-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-55-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-132-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-50-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-48-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-53-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-54-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2772-28-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2772-32-0x0000000001001000-0x0000000001002000-memory.dmp

          Filesize

          4KB

        • memory/2772-33-0x0000000001000000-0x0000000001004000-memory.dmp

          Filesize

          16KB

        • memory/2772-35-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2772-36-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2772-38-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2772-39-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2772-40-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB

        • memory/2772-44-0x0000000000280000-0x00000000002CE000-memory.dmp

          Filesize

          312KB

        • memory/2884-21-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2884-17-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2884-16-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB