Analysis

  • max time kernel
    143s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 20:29

General

  • Target

    41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    41ed32f676e434688450e1e8c62ce750

  • SHA1

    a3210524c563e4d4c7ab64cb46ec6b4962b6be2a

  • SHA256

    3e32f3f41e96b712005cba5375dd1d4b73700c40a2820ad014cfdeeb2c4da8e3

  • SHA512

    bc91c6bc4939b577de5242d9978913749178ce1f8b5e808cc772d9d5243223b11188fe572d1dc725b962f165f338bb064a5f5f34a3df59e6810d6058c2ecd8ab

  • SSDEEP

    49152:5ZwH0ScADC8NF8nEnsxzexRYUbkOguYwz3+d+hw/AFP:5ZwUSciPNF7nLYbOgiQ0w/eP

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\PekloCheat\PekloCheat.exe
      "C:\Program Files (x86)\PekloCheat\PekloCheat.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2792
    • C:\Program Files (x86)\PekloCheat\runme.exe
      "C:\Program Files (x86)\PekloCheat\runme.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:964
    • C:\Program Files (x86)\PekloCheat\4konya.exe
      "C:\Program Files (x86)\PekloCheat\4konya.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat" "
        3⤵
        • Drops file in Drivers directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\a0000000.vbs"
          4⤵
          • Drops file in Drivers directory
          • System Location Discovery: System Language Discovery
          PID:2524
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\b222222.vbs"
          4⤵
          • Blocklisted process makes network request
          • System Location Discovery: System Language Discovery
          PID:940
    • C:\Program Files (x86)\PekloCheat\newins.exe
      "C:\Program Files (x86)\PekloCheat\newins.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 908
          4⤵
            PID:1512
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {07E5AB5F-AAE0-4FB6-A5E2-221BEF97C27E} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\PROGRA~3\Mozilla\unidtrd.exe
        C:\PROGRA~3\Mozilla\unidtrd.exe -esjphrh
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~3\Mozilla\unidtrd.exe

      Filesize

      176KB

      MD5

      f6286dfd1bbab7cdb7efbae72f70e32c

      SHA1

      1cb27d9c121c6dd6b7b5f77a7e7edc15cf45c8b1

      SHA256

      66f8c60f08d9bb0006bf7836ba82035d798023ee208da939dd9a6c0c46373be8

      SHA512

      0a49467804f945428df885ca1f1cd7ca2419b3c8b9adf6baff045a647a8dedddc2becd6a15f280f80c3ea16c526e3a1843b66cf4aed47749174e4936e8acf830

    • C:\Program Files (x86)\Fe\Oa\a0000000.vbs

      Filesize

      1KB

      MD5

      58eeef7fad223983c70b5d0c91aba472

      SHA1

      b42ca4c0b460f92d70bd0f3833b225a107a52cfe

      SHA256

      6d80a4d9927fae66e838dc195c857630a81ffc970cab587778e1dea21cff49db

      SHA512

      e85edb73a639fe947904960956a28d701dee62d1c434ffb11b1d55254705eaf335524c4240bd7dfd22d455acdee68d6600d03f95298ee466148faf58aa680432

    • C:\Program Files (x86)\Fe\Oa\b222222.vbs

      Filesize

      161B

      MD5

      55106fe0a0c4bd1efdf0262512175d87

      SHA1

      983dac43a06ad9bc9c487a40717fbc6b5f1b4a23

      SHA256

      2783fd1e87d7378c897919a6e08b5ca9263f3529428f78e0743953dd0b5cebee

      SHA512

      0c17de06c74a95a20d4669e963fb2998177f969f037968c13f6afc72350f2d8672e00d9803f1d07961b65fa1dd309b9694bc97fcc95cc2580f1e394c9c50770d

    • C:\Program Files (x86)\Fe\Oa\cizfffffffffff.az

      Filesize

      27B

      MD5

      213c0742081a9007c9093a01760f9f8c

      SHA1

      df53bb518c732df777b5ce19fc7c02dcb2f9d81b

      SHA256

      9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

      SHA512

      55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

    • C:\Program Files (x86)\Fe\Oa\kk099999999999kk.qrw

      Filesize

      65B

      MD5

      3e08a7aa432b615b5d0a8d01704b20c1

      SHA1

      db1f8fa524f7b078404466d3175f371c39aabb83

      SHA256

      e6ff55027225808db193cc6367122b7285f101150bd49333cb872e3266d46cd9

      SHA512

      0048d76339bf007e53c04c71aa0982ab09082c51fd8533ca652610bb54481e123dea4fb80653585d5285651ed85b4093308bed50b68cbfe75afd32714d670785

    • C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat

      Filesize

      1KB

      MD5

      c6c8bab32115a3989f153b691ced733d

      SHA1

      645412f15b3e36fd5eb184e27bf39c15599748d5

      SHA256

      c1b73590afb430e3f4df5ff2a219a3d563a22cd181ced8daa21ac6f874c9a1e1

      SHA512

      b84e61c820f19fbfa7aaffccae0b62d08b3106acc3bcd9e902e8ac9c08da44435a4b160c9c53bb9035322920d356e8c10b397c9901ed1dca85882f4f0a70c1ed

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Interop.IWshRuntimeLibrary.dll

      Filesize

      48KB

      MD5

      8ca21ef0590d00d8c5537886019bc330

      SHA1

      0a47c8050b4334880a92f6ba758db85cf1716045

      SHA256

      5c8a4f97a4401e3dbed6b62efb4d5e4b91a65ee19442cacc05b98f395ffa852b

      SHA512

      aeff5c046817abe9449bddff25f587d0f6c33d0e587ca6ebef8747212bc1fa3c8337dc84f78ca9330fa16ee949fa788103da0160a335acedf1d442665fce1368

    • C:\Users\Admin\AppData\Local\Temp\htm\page.html

      Filesize

      4KB

      MD5

      694f8b91c2d757022aab5641cabb12be

      SHA1

      c8e433ec7b966f31d3739da0d3d9684d01c79ab4

      SHA256

      1fc8e46a9bcfbdd2bc7e5a18369b2eb048a209b921452272b0493608be16204a

      SHA512

      f4932012d059ccde15e9623f21e24fdfaef37f8570af83f4d9aff9f3309b6612b98cc16e73e6e5e58538a9b8c88da38b6c4c99f3a08b0347d8f392784c944423

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      92036828bac612fa2841b2c29abfefca

      SHA1

      7e5918fbc087cf229b82fd2eb3095f7565aaae92

      SHA256

      bdbed96ff491e15ec277374246b2590fe5999f168f484063873ffaa2d0e882e4

      SHA512

      0c4f7cce5f47738c0f931374abffe2b05060d55b1dcf5baf82453b26026de97a5fc88d5471abfcf26e687f10c8ab70a12a2a89c066bda69fd197acec63354226

    • \Program Files (x86)\PekloCheat\4konya.exe

      Filesize

      128KB

      MD5

      7b69e435c062c5fad1b9d15e6fcf905e

      SHA1

      3cd33e4cda1eec87758c7a4e59f61b92a00e0dcc

      SHA256

      f6de28551cfe268583d7f9d34b35c41af9fdc46026f66d6a542900e67724ca8b

      SHA512

      dcc7e33cf990e21a8a8b3bc3e3598e5604f4ad58f2de437459b0acaca296b27be9f438e76024607c65db0cc6ebf198d58dfb2dada72b3b8bbc62ee68bd89cf72

    • \Program Files (x86)\PekloCheat\PekloCheat.exe

      Filesize

      1.4MB

      MD5

      bd8747967e7fb5f7e80c1be71f4c796f

      SHA1

      7f71cf7a89f8f5f576898bef94714de1d3c57c92

      SHA256

      1168437d522bbd8102351cf91c09e92c8ddc92a5c4e0a3a2a6c9a1ee5861fcbd

      SHA512

      a03076d8e3f99ba156b8922182d95da8d712a5f9dcf1c1f517eadb2172f2103c10a3e9b1b6a14dcd8677cb759c9c97119e0cf720e6f20055b9ac9cf6d1226da4

    • \Program Files (x86)\PekloCheat\newins.exe

      Filesize

      123KB

      MD5

      4496eb67c762bfbbd26b9b5fe9eb1c67

      SHA1

      d59a0935137d04831cd19652e4899b912df0e6ce

      SHA256

      f5de87c232daa8e5b17393841b758ab576916df80b0e395a845ad3d3f4b58580

      SHA512

      91fb42b40dd4b65b14133b7a2bbab66cd0e5aa85ee118841fc57d92d163a0fd80319ae203a1cab12314c7c18aa48ddf67baae2e68242a44a47b69c667cb79676

    • \Program Files (x86)\PekloCheat\runme.exe

      Filesize

      176KB

      MD5

      f6d2eefd8d5eadb52ec0cd3c3526b7b5

      SHA1

      299f02ea5aff2231f92b024ec830b6c1af286977

      SHA256

      a2ed71f40e20980940eb47d0f1a5fffde0627934536de52104d1caf956912c7c

      SHA512

      0c0d22f8c85192d686841915d1b306f9e4243acf40b0ee2053c86d84970cc96cf75f5c54b1b8df5105a69024b1b416cc6abcd00dfa0673606fcf5f99269abba6

    • \Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe

      Filesize

      85KB

      MD5

      b5d986697e72cc0554e699510741e46a

      SHA1

      bee206bb66f98529c01f5bea56169dcc36addc27

      SHA256

      3efb733026ae60c8394d85c9d7f3c65dcd83f12450bfc9cea4ebddebccb53274

      SHA512

      5d1dccfd6fa157fa3e302356bc89caf750476f3a48eab2647df05ae3da364f91e214f7bcc7d1ca6128a368327c063284a09bcd9713a178ef555518eddb0686d9

    • memory/964-204-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1648-146-0x0000000002890000-0x0000000002990000-memory.dmp

      Filesize

      1024KB

    • memory/1648-145-0x0000000002890000-0x0000000002990000-memory.dmp

      Filesize

      1024KB

    • memory/2236-105-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2648-152-0x0000000000470000-0x0000000000480000-memory.dmp

      Filesize

      64KB

    • memory/2720-221-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2792-217-0x0000000000400000-0x000000000056E000-memory.dmp

      Filesize

      1.4MB