Analysis

  • max time kernel
    118s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 10:22

General

  • Target

    56e8a286e6a5504fab77534fe831ea18_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    56e8a286e6a5504fab77534fe831ea18

  • SHA1

    368e77815644a8ff8e751faf387cf65ccb263bef

  • SHA256

    6a395571f3699876e6d4703212a9ac03450e24c50be44d3343d157cb90673f11

  • SHA512

    523aaf2714c237b80a0d3c4f1e5878e15f7cf7f27422964cfdca14195ee1d132ab63882ced907147000a12b0df4905dc7d6cdcaa4a677eb832f14ccc0ed325c2

  • SSDEEP

    1536:TlPnR30KMGmnNGWTmJ+MnGpT5/tjreKWCbd8LeQXGSWnhrxMJfUQZNFbdsQNoz:J6KM1nNG7J+4wfezCbd8XXGH4fUMs1z

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\56e8a286e6a5504fab77534fe831ea18_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\56e8a286e6a5504fab77534fe831ea18_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c start iexplore -embedding
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2560
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\gNYF2E7.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 124
          3⤵
          • Program crash
          PID:1156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      05f4cbb48c320d7005a5e609da9912cc

      SHA1

      7cafb0c7a5a363d21850e951957b2132fdce74a4

      SHA256

      ccbe74e4798777de4b29ca4c99670d09cbe4a7ec613944cb5ff4ca79f81e4e07

      SHA512

      a8264b8447842f7e2e86a86fdb69813339e44a2aa05d56b4eca358634ebcad7eba7172f0a94ee2d703256c9c69b95efba73f01b5f7291832b2a04f8ca6dbf2ce

    • C:\Users\Admin\AppData\Local\Temp\CabF411.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF491.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\gNYF2E7.bat

      Filesize

      188B

      MD5

      48fc8f2e5435bf119dca8eef366ecf63

      SHA1

      00e9a4a311d58165aba7950abce91f23dfa79a60

      SHA256

      f138b2d714facaa4138dff8ab4e12d9947d015338d6d248b8d4559cad31df600

      SHA512

      94c76b6b7eae123c7c7b67f656c31fcf4be27ccd031797e4d9eb5b289ad8129b112a6e443692113043d0fb26305353deabf0a24ad2492df753a59f5cbafad38c

    • \Users\Admin\AppData\Local\Temp\gNYF2E7.tmp

      Filesize

      63KB

      MD5

      986911b25e85ad6182ab529209a6f43c

      SHA1

      922f3e02157aa7c9620d7c3cab7bf879dfff03e8

      SHA256

      c15829495b482497d05dc5af31d10969fa8f17981cb9007012ec1c255d268548

      SHA512

      088c1522b5405f589133242c70362a71799d359a43475d1eef611cd285222c515700121b76a74b90a70344afcf56b3cb006fd98405fc27873ce954649ae849cd

    • memory/1188-25-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1188-22-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB