Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 02:53

General

  • Target

    298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe

  • Size

    766KB

  • MD5

    298b2ebc55fa47339c6f4f05ca54e421

  • SHA1

    217b3338bac08f4324f4ed02bd8d91f86e60b94e

  • SHA256

    1ec188c0d0fb8dab2cd418c309e690f474ed6a29cd4070626ae7c55ec559fda9

  • SHA512

    1b2fa5bf882162d752880681cc7730206ef86104d0cdc997bfc2ff6802466f8ce278a0924d443c4ef4f836628c8edc1ce3d5d8762b292352c3d16a18c22be376

  • SSDEEP

    12288:Ezxp5cJwY+ZuoCvYDMHaGKCt3DIi0S80hrRZaqWR40rHeluRuzA1uWat3JUt+:EzxjcD3ozDM6GvNJvhjyR4kKsYAw/Z2+

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\SysWOW64\Boercservice.exe
      C:\Windows\system32\Boercservice.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1764
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\del_1.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bf3b8b609c900528c97c5b5387d3972

    SHA1

    63690d2d59915949495d32f2489eed3cb4e27082

    SHA256

    5de0cc74e007138e69d100c4ec2eb8d196152fbe2ae598c3211e97db67dfc574

    SHA512

    83a34496abf8b0a5673cfcf1976e7befa6b91331c835502a8c96267769056cc8bf40804e82e10f6927067268c35dc22d11fcf2bd7f8f07e6c76e78f1f640af9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c31a9ce97344925aaaf6b625e430ada

    SHA1

    b7a3a883942145e9497eb0b346d34708fd2966a5

    SHA256

    003bbd6a11ff4b8139c07cd68104f5bb0aedfe9d153c98b5092499b486466b33

    SHA512

    4b40a02fd5db8dcb75cc48e9099e5595eec816e8c7ef47549fdad09514e2e7ca6991dd969764fed631a335d2efaf0018f5998ad01abe66efb04709ae9a2f2912

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e54139f5c52291773a0d762acef9aaec

    SHA1

    bcf5d69f56c97c371a2ec6ff03b9fc5f9ce7ab7d

    SHA256

    79859f53844b3d973c882c46dea77ec163911609e31a0da7ebf0ce23fcf1ac05

    SHA512

    68edca53776f80fc9f7a5f055b2d32bba8cad7a1d697dd12cfbb8b483f4d50cc040cde8ab9b93fe5dda299818e6fd07c383d981d275f95bae4be29accdf03274

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3d618849578873e0c4957e955b917d0

    SHA1

    7aafbf2cfe5d2616e863ad448638d14d94e0505e

    SHA256

    e80547e6aca89f703ab8255e862e41f8905994e9d9f84d1ee3bd8d4c8de242a7

    SHA512

    eb2041b2ac54d76c9b83a139ba5863a25a5cb617d23f1a3d90a8b2574440d5cb5f677e8edd20c4a064f7689e0fc67c2defbbe5e466fd20cd96de3ed6b7c5dcb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99a5d454735c65fd2099e5a07880a7dd

    SHA1

    2971709a8162c01f4d720e323f7b924ca44bbef1

    SHA256

    d05376760d1dd501cf7cfcc849139a4b2f291e32ffa119afffd3a4799c21e376

    SHA512

    0f55e1e7d7a699071395b55cb193551171a6ea1aa72fcaa8d871967aa38117d5534bb5685cd1f187d90bbdd61e16e475eda534a2b10740ad661637ebe84123b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b83a228763e0be50480eaff9da1d8b76

    SHA1

    02c8c151035e278012ac7379b5c79d0eeab8fc82

    SHA256

    831c8b515806131d2e993bc933543a295e149a2ae3b8a33d950514dc88a18309

    SHA512

    3fdd1508d7e4d490fa3eb1b2a743cd4787657c36fa83c62f298cb0f0040d80735a7700e2704d25c37bf7b469b4a835d2989519642c763364858bfc1e72cefa84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d33981b657a7fedf25f522571903068

    SHA1

    a614e2f0c6c02de454167949dba7acc3765f062f

    SHA256

    3fd5fb7bd5e3c20e514e13d1250c82da5f80868e1a13d9fa87180637907ac365

    SHA512

    f24dce8d0c21c013a8b7ccc7048bda0805a6ee9fd6888203fab745d6796d3148fe8de33b2d4f48ef6b1ba296c621107de9b570f115dd27186d882914eed53a87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cc0b59af5126abcfc3fe129bf6a8824

    SHA1

    a8285d914f1df61aac62cd8279dc2a08dd2a9e6f

    SHA256

    e041314a587619aea8d5a1ab95e8f97c2170bfc3dffaa90658ab50221c3e4fca

    SHA512

    9994dbf9a49d132df6041e15235cc56c879cfdb6b41274edaa26b7b559145ccfba10dd551eff065dbe0a2ff7ab6e45138caaec24357487480069574009616e81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    057e946edd13c82b0f7569dbbbbdfc51

    SHA1

    c5e1d1582b29ac33a8328762cb2de924b4739cc1

    SHA256

    0f9d4b836480fa0590311a53026e0c5b3a257a0130ba87cc18d2a66517d78490

    SHA512

    20197282c6f3cc9a0ddf3e887b522429f1af84529f8c188b2301f45495e59ccd7fc744d13aa36b65a838358074422643a841b86dd91fd779b2e12f12c58af0cb

  • C:\Users\Admin\AppData\Local\Temp\Cab64BD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

    Filesize

    34KB

    MD5

    387cf1d2f17aff6967f3107773764513

    SHA1

    b971bcd44988bee744f8133acb032e07d9dcd1db

    SHA256

    74c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6

    SHA512

    19a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c

  • C:\Users\Admin\AppData\Local\Temp\Tar655D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\del_1.bat

    Filesize

    230B

    MD5

    9fb410bc1b353525d39d74c6a83e714b

    SHA1

    e99bc6e4f8d006c0903567bb4a9ff034341cadfa

    SHA256

    a1ffcb30b9c87b0200796e4ad7fc7900e45cf8bb09566e4bbbbcf33895063f9e

    SHA512

    0348faf183efc96500f571866798fb1ed70787b97da3c84012a5831eea6746a7e1ce22450644b0472fb1f3d9a43d23476ddb0bb53c5e79a4824e65cb23918a43

  • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

    Filesize

    112KB

    MD5

    2706bbdce10ad3b0d1dafc85a0668678

    SHA1

    94474aabe849670a09a8c29198a6c47092d60920

    SHA256

    05a3305b9d05ae5e7b8adc8cc55a80f9061af2159242ae7774e84020fad6fd6c

    SHA512

    7da270c6f1fceb90afec7a110216a023e6fda81bdec2c3aa0c6884c4c891e7aeedb698e3c24392723647e79d88df87e5c1eb867fbe75f09372ab1a052b8727a7

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    406KB

    MD5

    e79169d47394020f7c893abb840b61bb

    SHA1

    c5b9c2cbef3d5458b52ebb67461e84432673fb1b

    SHA256

    11c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc

    SHA512

    21ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a

  • \Windows\SysWOW64\Boercservice.exe

    Filesize

    766KB

    MD5

    298b2ebc55fa47339c6f4f05ca54e421

    SHA1

    217b3338bac08f4324f4ed02bd8d91f86e60b94e

    SHA256

    1ec188c0d0fb8dab2cd418c309e690f474ed6a29cd4070626ae7c55ec559fda9

    SHA512

    1b2fa5bf882162d752880681cc7730206ef86104d0cdc997bfc2ff6802466f8ce278a0924d443c4ef4f836628c8edc1ce3d5d8762b292352c3d16a18c22be376

  • memory/2624-42-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2624-0-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2624-43-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/2624-20-0x0000000000250000-0x0000000000293000-memory.dmp

    Filesize

    268KB

  • memory/2624-9-0x0000000000220000-0x000000000023E000-memory.dmp

    Filesize

    120KB

  • memory/2624-6-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/3036-49-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/3036-50-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/3036-33-0x0000000000350000-0x000000000036E000-memory.dmp

    Filesize

    120KB

  • memory/3036-27-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB