Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2024, 23:43

General

  • Target

    3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe

  • Size

    568KB

  • MD5

    3768a0f4934d3d9f907f2002a67b434d

  • SHA1

    d61545256415dc2adf3b8a5c54fbd80aa87a3185

  • SHA256

    175632ea5f75d18a938d2a47c1a949e24471b862c18018360ccc9fa763167218

  • SHA512

    12ca1f5bf0c58d2c1b59011d4cb5fb08757e87425900ffa7480f3e79190462ae929e211718b6afb5d05b99efb2f550b29569f01248a4267c93c35898e6723906

  • SSDEEP

    12288:H/2zQdOdhoMW7k7PMe364ta9GaJoAvNBExA2K5agXTRwWFShQ5qsO8fNb:6yk7PMat

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exe
      C:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4928
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3484
          • C:\Program Files (x86)\Google\Update\1.3.36.371\ogleupdatecomregistershell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.371\ogleupdatecomregistershell64.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1104
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:496
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4368
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 2460
          4⤵
          • Program crash
          PID:4528
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\sc7kiydup.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4748
        • C:\Windows\SysWOW64\attrib.exe
          attrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2292
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\sc7kiydup.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Windows\SysWOW64\attrib.exe
        attrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:4876
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2580 -ip 2580
    1⤵
      PID:3496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      854B

      MD5

      e935bc5762068caf3e24a2683b1b8a88

      SHA1

      82b70eb774c0756837fe8d7acbfeec05ecbf5463

      SHA256

      a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

      SHA512

      bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      39c9e39c12b68f21838c59a07486d354

      SHA1

      38beb9b66616bef0882c40adc5caed0659a24e8f

      SHA256

      823d033109289b60ab9521b7ee4403ccc159b170b49187acc83cb479e923a89f

      SHA512

      77f279e15c66dc1180ad10389314de2f57f0949a37a1ac41f32605786e9cb7b233d9730ed7414a05fe95dc2aad34af06b3e56cd16853589825d78bdbb637d535

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_A3FC0BC6A75F11C789144CCDE90F5957

      Filesize

      471B

      MD5

      91a82d2422caa27027533fca4f889295

      SHA1

      5b3a8f523c672ba63e44e81533d793fd764ea1d6

      SHA256

      a54112db60b54e85ca8c98f625a521d1d08511c9ee412226b06e66a61a48b00f

      SHA512

      9e8df55d3f5a0c4adb89eb38c799f52c4640e3671ff0bcddb7a3f3b103057fbd9e7de2c244fb517d6bd0766e8ddd1c18c66ea108a6731ce942d5c7940f023b56

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      170B

      MD5

      e05a54d87779a7b5a18a76de6ee75aac

      SHA1

      a1bc2daf41b2771653082ba9d0cba255bc2611cb

      SHA256

      4d0f6f1b067a1df60acce1476197d3d25b50726c21d5dfdb6ab369c6d5b673a8

      SHA512

      3879540a27c657a73bf6027915f97429c76c75209b88d93ebf9c7b50a5b9598c4b9539d6ac5d866b3d0c98f527069db923347abce6ae32a71c477de5c8cddb52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      36cef80d181badfaf00197dcb610628f

      SHA1

      2641a6455c78250a4452c8d3a81a0834ced7f60c

      SHA256

      9aa67e99bdd156d0b480bdbda11aaa7236e040987b3b998f295c8b7177a1981e

      SHA512

      73f4f402021ea126573e5881d23cdefbe3f77a9b53699031c2dc7c26d2c7e9a6ec455570ba03a7b7ed0c8baaf89b8d5c379d880bda7ecab833240259f5f977e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_A3FC0BC6A75F11C789144CCDE90F5957

      Filesize

      414B

      MD5

      ad634dabc18896f0e7b2fb2d87490067

      SHA1

      20549e4356eb6592d2a261ec0de2ff76668c43db

      SHA256

      d957986beb6de32e6bd55724ce09f89d187159757bd979f24eeefd9eb4ea4a55

      SHA512

      873a1077d5400d2e2f15da73d5f997ab5af6f15c788c66838fccd3b5ab16d12dfecebf5c6b6927d886b276025e624f0c3f9500adc12aaee4e5c7dcedaf9778db

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGH3GSHW\ET5LFGH0.htm

      Filesize

      20KB

      MD5

      6b643a983169fb83d5053cb469013e89

      SHA1

      fdef34b5abdecadc03192787800fa4dea59b800d

      SHA256

      4a7e9f7a1af71bce7dd15e7d40525d848564c72c87590aaa907d13344a102994

      SHA512

      91a83705ee2768e1e38619c1e01ba97884c9834a9f90342e810176c7a3148bd05e803b17af107d4a1516492094ec67df698d5bad9b3fca8e166e435c7e720fdd

    • C:\Users\Admin\AppData\Local\Temp\aerxqb887bz.txt

      Filesize

      5KB

      MD5

      898b876ca1dfe89c5d04e2766c351cae

      SHA1

      5d4886e0031d7156a21b14d11a0001659f350132

      SHA256

      93e93e21b9c1a99972aea3a35050d9d1bbe5d37fe8219171eefbacd10f3a362b

      SHA512

      9adf12addc0d7a50be839640fe5991f0355052ad55f360c012ec116c452cb9583620de5b35c0473ffce80044b9def99491cc404f17e840eee8c1fdde9c66c414

    • C:\Users\Admin\AppData\Local\Temp\sc7kiydup.bat

      Filesize

      268B

      MD5

      99982c80a600a39feeef23da1fdb89ac

      SHA1

      514e998a016d4589227706aa4332f3ecb73523bf

      SHA256

      2e40b6e72b5afee1b508e17f6848674d564698c93a47524aaee232a1484ca192

      SHA512

      06233b277622ee2559ddf3b1765d74d39851de39003f929c9db958ca70ecb375344b41809807ee1fa3d5f97f5db0dd087f2b4fc52b90041a1cdf32a98b9d5696

    • C:\Users\Admin\AppData\Local\Temp\sc7kiydup.bat

      Filesize

      352B

      MD5

      006a95b66be786609c38f67c8dea3ea8

      SHA1

      b4095ed2736d113348241d620a278716c7f37cca

      SHA256

      97bed3cfa33625d815a7f4304027664329c57a199c2e03f3f21981775a361a05

      SHA512

      f5cc05903efc42aacddb361623a9996dcf8ce65c6eaf9f0cf8ea00c4c3e0816abb949026a4166edb14ee21bcb6ef82b7bd782fbd9f947639ead157d0acc9717c

    • C:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exe

      Filesize

      568KB

      MD5

      3768a0f4934d3d9f907f2002a67b434d

      SHA1

      d61545256415dc2adf3b8a5c54fbd80aa87a3185

      SHA256

      175632ea5f75d18a938d2a47c1a949e24471b862c18018360ccc9fa763167218

      SHA512

      12ca1f5bf0c58d2c1b59011d4cb5fb08757e87425900ffa7480f3e79190462ae929e211718b6afb5d05b99efb2f550b29569f01248a4267c93c35898e6723906