Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2025, 02:40

General

  • Target

    JaffaCakes118_2a3291a66aa6e728f703550f7adf9ad6.exe

  • Size

    1.1MB

  • MD5

    2a3291a66aa6e728f703550f7adf9ad6

  • SHA1

    181172448f83538584589f2d9574c6d0b9a6acf5

  • SHA256

    359dcbe6360ff33d39f9218bd9e6f1023c2c6ef34c557abb386d95c5056b08b4

  • SHA512

    22294180e6834425aa0abad3d7ba6357ad827edd0f0b1558b41b5a6094a4872db9231c39bad6e89658011c251a7edeb2fa817894f9210f56c74afc25b426e04d

  • SSDEEP

    24576:Y5rSlaS4P/HPBUQwkgOJoshXfdjwqnftr+4d4Ds:YR3PBDwkpJZJ9Ws

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a3291a66aa6e728f703550f7adf9ad6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a3291a66aa6e728f703550f7adf9ad6.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32.exe /s C:\PROGRA~1\QVOD41\QvodEx.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\QVOD41\QvodEx.dll

    Filesize

    572KB

    MD5

    24de46e8e82fa835bffb7e220c745375

    SHA1

    cba4995d474fbc30425714b1e6e78c94d9778117

    SHA256

    f4b6d93fe28c846f307f1b2ab735c5db50cbda3d226369f6bd11edbe141668e9

    SHA512

    1120c1bec421a17cd81c1b1531b50d6984debe07ba5f8602acb5a3e7d56383274e06b87563b46aaf79e55955b83f0a53b4d1d67e99bda7091ac800f945510a0e

  • C:\Users\Admin\AppData\Local\Temp\DelTemp.bat

    Filesize

    151B

    MD5

    3592194d91a762302c6d9da1fa1c76c5

    SHA1

    bbd57ecfc5265358118aedf07810c8de06e38c4f

    SHA256

    65326a57224c0283c59b576ce0663b54c18f8a36cb977db1a1749176a46fd78d

    SHA512

    501ce0925a479ad973779e15bd17601b64773463ec4a765eda2b405fd80e103f74e24658809ff7d3deed49d9701087c3110377a0c4253734f0bac913798d31d1

  • memory/1708-4-0x00000000005F0000-0x0000000000684000-memory.dmp

    Filesize

    592KB

  • memory/2360-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2360-14-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB