Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 03:08

General

  • Target

    15ed1604d4e53d9efea6b9db60442816_JaffaCakes118.exe

  • Size

    118KB

  • MD5

    15ed1604d4e53d9efea6b9db60442816

  • SHA1

    200ce47825c630b323e4ba071593be271e52b95c

  • SHA256

    c138cb7ac374963c3d4cedc5964e2d93ff34491c951107d7079aa1472ede2aae

  • SHA512

    5d1353753c765047d1d5ca9bcbe481542e6dc150162b929232d48777583969cb73301f91c5990884d65e3e0c225c2d7f8c18fdcacb8a3d3b24626d081050d5e1

  • SSDEEP

    768:Vsi0NnqrjIcGA+9H5MQO7BUdLOyOLm/Cb5vTOc74Hpyfogpty2uhNqFeTCKp0JGh:VZHIcz+j0W2QA5v974JyZuCTJrv3BMe

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ed1604d4e53d9efea6b9db60442816_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15ed1604d4e53d9efea6b9db60442816_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\ZAYUOZBIDUJF.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\MeritoriousDepravity.exe
      "C:\Users\Admin\AppData\Local\Temp\MeritoriousDepravity.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2704
    • C:\Users\Admin\AppData\Local\Temp\MeritoriousDepravity.exe
      C:\Users\Admin\AppData\Local\Temp\MeritoriousDepravity.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\ZAYUOZBIDUJF.dll

    Filesize

    150KB

    MD5

    0a34d470caf398b187dca9110979e285

    SHA1

    86ab4f87662544d195fb0b941a6483fecd3ab79d

    SHA256

    d20f0a7f695c2d6a842bfc280e1f14a04ac3921218514eb477ae7b6af59be668

    SHA512

    ed292ea1f479ddcf9b6a445e388b729bc6b4525e0c165e28211695062c7a976065625b6c59411c98df161d7a58605159a50fc539a507bb885e0cc643bf52fc79

  • \Program Files\FlexImplicit\FlexDissonant.exe

    Filesize

    118KB

    MD5

    15ed1604d4e53d9efea6b9db60442816

    SHA1

    200ce47825c630b323e4ba071593be271e52b95c

    SHA256

    c138cb7ac374963c3d4cedc5964e2d93ff34491c951107d7079aa1472ede2aae

    SHA512

    5d1353753c765047d1d5ca9bcbe481542e6dc150162b929232d48777583969cb73301f91c5990884d65e3e0c225c2d7f8c18fdcacb8a3d3b24626d081050d5e1

  • \Users\Admin\AppData\Local\Temp\MeritoriousDepravity.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • memory/1508-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1508-32-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2704-27-0x0000000001E50000-0x0000000001E60000-memory.dmp

    Filesize

    64KB

  • memory/2748-31-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB