Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 02:58

General

  • Target

    299842b9c897755a46efcb93df554a07_JaffaCakes118.exe

  • Size

    22.0MB

  • MD5

    299842b9c897755a46efcb93df554a07

  • SHA1

    62252dae824977e7b8c75f310c06844f4fddb5a8

  • SHA256

    aaadcb542f9c56c0abdf1dcba049ad6395312fdb6cc114863abf67c1a2990e27

  • SHA512

    3ab4e1c2eea37bdb0976b01c91cc5774186e591445ac137ca30eede21af8a23d6da868552d68a70e7c9a69b0d5109acf72b7c3acd352ba457ec13374ea931239

  • SSDEEP

    393216:Zd16aPaPaPaPaPaPaPaYaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPaPai:56aPaPaPaPaPaPaPaYaPaPaPaPaPaPaz

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\299842b9c897755a46efcb93df554a07_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\299842b9c897755a46efcb93df554a07_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2544

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          9e4e693cc539453147a741b75e02dbe1

          SHA1

          1898126a55bbff5fdc1b5761831b69cf324829ea

          SHA256

          362d639e4cd1bdf6a636b6e87f02eb37963715c56853f3d2b8b5397de39021c2

          SHA512

          7612c7cead47a1703c6b8ccd30707b74eb84cfacce4ce9ea3eb3f07ed57c578ec5fe6932fb6c996b2f1e0bf6f410d4eaa0f99414a6a850d10aa45a4fc0425bcc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          51706d914368bfa778fd90c546773be1

          SHA1

          00377d5605028c8caa060bbc1c9452f596b80666

          SHA256

          9a75ec9f1eb28b4b9d8f41678b8a09335420774b0876255d7c243c8880f0b6b6

          SHA512

          1f3c2b6c2d383e9112021bb59921194ff5ce6e3428b8a63deab6134240d8c2dba638f5334ed22952488d3ee68c9ef4b75856b55396bcc71c7179a0495da2c8ee

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3d82e910ff9718d319557c5a3cbde930

          SHA1

          ce0ced3e648eb210a180b679d9e8a85ba4bc0f56

          SHA256

          1ac26eecc01733283846f2cf4589996f9b2555188530bd1acc72717b7cbe5f47

          SHA512

          c68ba5d1d3db42aebd611e12b465ae386c2b3145e33e23e1ebe136eb9cc516133bea3d4cde181ace1e3b1f6d4247e467a95ef337a32cdce8e3b991acd48b51e7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          713f8b699ae11d476636f20b6d00c678

          SHA1

          15b15ca2bf8e0140aeb1a69425f48d5e082b2e01

          SHA256

          60622f77f73175be7386222631f8094ba1033edf40738c5a56ac69a69ba9a5d9

          SHA512

          c90eca41a586bef583b4c5b6ebe7830addd60d0a34b4e69b7b1865294261a0b1d7a80962ff4b272c2d5fbe1ee8ec8ba6eb3775386f7252db8ad3bd02ec193dfc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c316c10ea940f9ac49847a3cf9ba5225

          SHA1

          537af1ba24db1fd886602bfb54818e3a8ab1539f

          SHA256

          c94086c2ded0a13fd8315bb2d322000a1b70187d698bfc69a9562ec03a272dc4

          SHA512

          ca55b43712839a57ca91a99bc1ac6aa47c28a99fdcb9ff2ad625a4a800cfb85a4e31d408d19e8310308c9742a336e4b8476a2a52ad5050a224fbaf4389acc4a6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          70ca1e00a6e409ebfd247105421833f9

          SHA1

          89544a27bfcb23a49c6e341b681188bec12a6acc

          SHA256

          69d16032865dd45cdc676a1e0e69b17595f6ee230d5bf9c35f9569f0ff1c695e

          SHA512

          a345d361a7e5946435b574dd50c1a2346ed46f3d893bf049a8404c1817f065f8ae11cb381a78346d2243795580a010d379dc3d98bdffc3d08aa213331b56e701

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8ac2f17979583f8c93a9e8cda1f40e78

          SHA1

          28400dd9a717f421c088d97f99a2fa5266c6b055

          SHA256

          577d8238aa88ad8f97f727500dfd01047b342a589238362aee8fd68d0c1c4f9a

          SHA512

          8f08afdfd22ac55579b5f4f4726664fd74e02f7194ea3b25e386262f3887083cf49a542eaa9273b872de9d90b83e95b5836b84110d2fecca9c67d270f7f34ea5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97f4042822ac6cba9ce55ba32132ec1c

          SHA1

          eccd7972f8dc82db84e3ca37b7caf0b4dcace6a5

          SHA256

          2a6b9ffed84ddea06be1b00a5bdb6db8117b11d7b6c7696a40ecafef73b0650b

          SHA512

          767727c864c2d250246e08b0ba75f72d580fce1619e36bd277d217c10a07fde24429c190a64306e1ac9ef59d5949ae9bfb2ea6fc8b3e71b0f16c50bfde1563c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          04fb11b0124aa1a69a49a6215ec580b4

          SHA1

          63b26159ac0568b96ad66904948d71dd4eec454c

          SHA256

          821c7e1c774623b03cad97444e2eef7d6d9a30d292887d3fbf25e4b76df3ea1f

          SHA512

          fb4d6ad626d41bc69aadc1d3d6424f8b105fbf0ad678f7b5bb246730bfc3118e368a8620ac9f526278adc814cd00b0c75a3d483769b48755481b63cbdc3f619d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c7096d045dee52fd1cfd63b4623b6880

          SHA1

          512c5b2b784cc995a8089537d63e2a3ade7a3320

          SHA256

          1eee0f981ca479e714b852b7ea95b5f71cb8d2f94e3dd3d271205d04ec1b2e4e

          SHA512

          60ced25b113695cb006c307029e7e4b3baecf98f1e839bed38afa8c917b91c9e4f3902b6fdd2aa6558563b9795aa2cf42c6084d48b6a5ac50653f5fbbcfa9d75

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3efec1e6f6a434b47abcca684011e7a8

          SHA1

          90c308a74c38dc58b9e02e501e19f9a261e54da2

          SHA256

          1ed577de97d1661010c0a0e93607acabcb8b003f3ecabc6ddb647c0e47db3bb6

          SHA512

          5d0c03344fa2c35b77d8ebd7b8c5176cfba3abf02df04f52ffa75097a393ca8e2c75a1547c216cac5ad05c13e3f3a8ce5a8d23126d74fb0557426ef2138abde2

        • C:\Users\Admin\AppData\Local\Temp\CabE6C8.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarE729.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1928-5-0x00000000046F0000-0x00000000046F1000-memory.dmp

          Filesize

          4KB

        • memory/1928-4-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1928-3-0x0000000000400000-0x00000000019FF000-memory.dmp

          Filesize

          22.0MB

        • memory/1928-667-0x0000000000400000-0x00000000019FF000-memory.dmp

          Filesize

          22.0MB

        • memory/1928-722-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1928-723-0x00000000046F0000-0x00000000046F1000-memory.dmp

          Filesize

          4KB