Analysis

  • max time kernel
    144s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 12:23

General

  • Target

    5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe

  • Size

    903KB

  • MD5

    5769f613b9098795f79b8eedcb864635

  • SHA1

    685a7fc226dc4e60daf8011cf92ee0143a65065e

  • SHA256

    a333f98a6636503dcf18047486bdd51a67b0addb1014b049362d5d0769f3cb4b

  • SHA512

    3f93c2e32895f4e3363a3ba72a5dd0857bac9d984155ece571444cbbc13eef315279dfb84689537a2f13a5e0706f15a44b82764eeb18b3c31d7f2a468d501921

  • SSDEEP

    12288:qk1/SPBZESknftnlARVptnjH1AkRRET0ZBT0Z:HSP/knftnlARVptnr1AkvEu

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2784
    • C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe
      "C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /csfc /scannow
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\system32\sfc.exe
          sfc /scannow
          4⤵
            PID:448
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /csfc /scannow
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1376
          • C:\Windows\system32\sfc.exe
            sfc /scannow
            4⤵
              PID:1228
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /csfc /scannow
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\system32\sfc.exe
              sfc /scannow
              4⤵
                PID:1692
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /csfc /scannow
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2896
              • C:\Windows\system32\sfc.exe
                sfc /scannow
                4⤵
                  PID:1772
              • C:\Windows\system32\cmd.exe
                "cmd.exe" /csfc /scannow
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2644
                • C:\Windows\system32\sfc.exe
                  sfc /scannow
                  4⤵
                    PID:2616
                • C:\Windows\system32\cmd.exe
                  "cmd.exe" /csfc /scannow
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:760
                  • C:\Windows\system32\sfc.exe
                    sfc /scannow
                    4⤵
                      PID:264
                  • C:\Windows\system32\cmd.exe
                    "cmd.exe" /csfc /scannow
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3052
                    • C:\Windows\system32\sfc.exe
                      sfc /scannow
                      4⤵
                        PID:2328
                    • C:\Windows\system32\cmd.exe
                      "cmd.exe" /csfc /scannow
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2964
                      • C:\Windows\system32\sfc.exe
                        sfc /scannow
                        4⤵
                          PID:2144
                      • C:\Windows\system32\cmd.exe
                        "cmd.exe" /csfc /scannow
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1608
                        • C:\Windows\system32\sfc.exe
                          sfc /scannow
                          4⤵
                            PID:2156
                        • C:\Windows\system32\cmd.exe
                          "cmd.exe" /csfc /scannow
                          3⤵
                            PID:956
                            • C:\Windows\system32\sfc.exe
                              sfc /scannow
                              4⤵
                                PID:1096
                            • C:\Windows\system32\cmd.exe
                              "cmd.exe" /csfc /scannow
                              3⤵
                                PID:2188
                                • C:\Windows\system32\sfc.exe
                                  sfc /scannow
                                  4⤵
                                    PID:2512
                                • C:\Windows\system32\cmd.exe
                                  "cmd.exe" /csfc /scannow
                                  3⤵
                                    PID:1484
                                    • C:\Windows\system32\sfc.exe
                                      sfc /scannow
                                      4⤵
                                        PID:292
                                    • C:\Windows\system32\cmd.exe
                                      "cmd.exe" /csfc /scannow
                                      3⤵
                                        PID:856
                                        • C:\Windows\system32\sfc.exe
                                          sfc /scannow
                                          4⤵
                                            PID:2052
                                        • C:\Windows\system32\cmd.exe
                                          "cmd.exe" /csfc /scannow
                                          3⤵
                                            PID:2452
                                            • C:\Windows\system32\sfc.exe
                                              sfc /scannow
                                              4⤵
                                                PID:2508
                                            • C:\Windows\system32\cmd.exe
                                              "cmd.exe" /csfc /scannow
                                              3⤵
                                                PID:1088
                                                • C:\Windows\system32\sfc.exe
                                                  sfc /scannow
                                                  4⤵
                                                    PID:3068
                                                • C:\Windows\system32\cmd.exe
                                                  "cmd.exe" /csfc /scannow
                                                  3⤵
                                                    PID:1708
                                                    • C:\Windows\system32\sfc.exe
                                                      sfc /scannow
                                                      4⤵
                                                        PID:2696
                                                    • C:\Windows\system32\cmd.exe
                                                      "cmd.exe" /csfc /scannow
                                                      3⤵
                                                        PID:2720
                                                        • C:\Windows\system32\sfc.exe
                                                          sfc /scannow
                                                          4⤵
                                                            PID:2664
                                                        • C:\Windows\system32\cmd.exe
                                                          "cmd.exe" /csfc /scannow
                                                          3⤵
                                                            PID:2544
                                                            • C:\Windows\system32\sfc.exe
                                                              sfc /scannow
                                                              4⤵
                                                                PID:2548
                                                            • C:\Windows\system32\cmd.exe
                                                              "cmd.exe" /csfc /scannow
                                                              3⤵
                                                                PID:2712
                                                                • C:\Windows\system32\sfc.exe
                                                                  sfc /scannow
                                                                  4⤵
                                                                    PID:2228
                                                                • C:\Windows\system32\cmd.exe
                                                                  "cmd.exe" /csfc /scannow
                                                                  3⤵
                                                                    PID:1076
                                                                    • C:\Windows\system32\sfc.exe
                                                                      sfc /scannow
                                                                      4⤵
                                                                        PID:2084
                                                                    • C:\Windows\system32\cmd.exe
                                                                      "cmd.exe" /csfc /scannow
                                                                      3⤵
                                                                        PID:2828
                                                                        • C:\Windows\system32\sfc.exe
                                                                          sfc /scannow
                                                                          4⤵
                                                                            PID:2116
                                                                        • C:\Windows\system32\cmd.exe
                                                                          "cmd.exe" /csfc /scannow
                                                                          3⤵
                                                                            PID:2872
                                                                            • C:\Windows\system32\sfc.exe
                                                                              sfc /scannow
                                                                              4⤵
                                                                                PID:2728
                                                                            • C:\Windows\system32\cmd.exe
                                                                              "cmd.exe" /csfc /scannow
                                                                              3⤵
                                                                                PID:2864
                                                                                • C:\Windows\system32\sfc.exe
                                                                                  sfc /scannow
                                                                                  4⤵
                                                                                    PID:2896

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\messenger.exe

                                                                              Filesize

                                                                              91KB

                                                                              MD5

                                                                              e745b649add2a0363e0339a62a77d0d9

                                                                              SHA1

                                                                              4af3f9f46112563e90dd001afa1776b96fa205c7

                                                                              SHA256

                                                                              73be7f6ed8d8cfa79107e3fd90fdfaac397054ed4ffb64779fdac09aeabd9da6

                                                                              SHA512

                                                                              e200e2db300566f5161909670b8120c00d1c8e53309cdad7d5a1e380508155552449891c54e70929e700fde9bc1927ea33425cf5d9bed2fe2d8fb91978c9b64d

                                                                            • \Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe

                                                                              Filesize

                                                                              529KB

                                                                              MD5

                                                                              413d07016aba2a424318ebef82ff8a77

                                                                              SHA1

                                                                              2b0dea0d4c65f04eb3f8801b0c1d265effa139a2

                                                                              SHA256

                                                                              30283bea53bdb8e385af9467c27c45209fc2bc298a76242adf747bf843773d66

                                                                              SHA512

                                                                              0d8a8c265a882a09f3677cceade583aebd4b3e89996baa3f5413462e383e439adbc0b28c844805cc51f42572b0955a0ed46d001c377b8f40824bb77d4e92b401

                                                                            • \Users\Admin\AppData\Local\Temp\nso5919.tmp\NSISArray.dll

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              14b848866035dea39b912da628307231

                                                                              SHA1

                                                                              d00c8963aee8038d8a22f098cef69b31007196e5

                                                                              SHA256

                                                                              6a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc

                                                                              SHA512

                                                                              4538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16

                                                                            • \Users\Admin\AppData\Local\Temp\nso5919.tmp\NSISdl.dll

                                                                              Filesize

                                                                              14KB

                                                                              MD5

                                                                              a5f8399a743ab7f9c88c645c35b1ebb5

                                                                              SHA1

                                                                              168f3c158913b0367bf79fa413357fbe97018191

                                                                              SHA256

                                                                              dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

                                                                              SHA512

                                                                              824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

                                                                            • \Users\Admin\AppData\Local\Temp\svchost.exe

                                                                              Filesize

                                                                              168KB

                                                                              MD5

                                                                              0c3f735c0cca87b1da6956b216288d1f

                                                                              SHA1

                                                                              9dda74e792329af180d4b4ca8e7bd611e020fa44

                                                                              SHA256

                                                                              4b4cbdc0ead3480f31b7fb54bad8dd5913f4cf9aaee6b44d349c2e27940ec5e5

                                                                              SHA512

                                                                              8fd47a669fdc01c1a24a94dada599f2f23a2213daf827b233c180d9ebc6e902261f365423ed4729c8401658d41e97e802f8ebc3e918321394986a0938a65b647

                                                                            • memory/2656-43-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                              Filesize

                                                                              404KB

                                                                            • memory/2788-15-0x00000000001D0000-0x0000000000250000-memory.dmp

                                                                              Filesize

                                                                              512KB

                                                                            • memory/2788-44-0x00000000001D0000-0x0000000000250000-memory.dmp

                                                                              Filesize

                                                                              512KB