Analysis

  • max time kernel
    17s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 13:02

General

  • Target

    JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe

  • Size

    78KB

  • MD5

    8aafd50aac3e9730d337421060bbd201

  • SHA1

    aaab5812392d7e620736211d47c02ca0793a3e3f

  • SHA256

    268fc2013b2620acbfa8a726b3b78ff584bf7b067e7bbe15ccc85e671a6745e9

  • SHA512

    83c1bf5cacc7059bb2b7ad44d041e1cf1e3afeda6487a5c4a967229780fc54573fed17dc1ff413ed86f372d31c59a76696aa79df3ec78749b0405676ec9d80cd

  • SSDEEP

    1536:26mrbxxuzuCTChMLJUK3bRPr1mb0KdeWbdTTo:2vbLQ5kgUGbRDsmGdTTo

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 45 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\LJA\CJS.vbe" 0
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2840
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\OEC\QDLMJNKZUQ.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2796
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c regedit.exe /s C:\Windows\reg.reg
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe /s C:\Windows\reg.reg
        3⤵
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:2676
    • C:\Windows\X\smss.exe
      C:\Windows\X\smss.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2828
    • C:\Windows\X\smss.exe
      C:\Windows\X\smss.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "microsoft" /d "c:\windows\x\smss.exe " /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\LJA\CJS.vbe

    Filesize

    1.4MB

    MD5

    d5def5a3bf2c5852124a7ad61c1bb570

    SHA1

    f116aef31e3f71b50c92165fd3c8d67db14c840c

    SHA256

    20f75b6128f0b69cb17e90535881c7312f1c86646e11543aeb8683ee02dfda0f

    SHA512

    f94eeed41ad1ce2e9abc688962e9a2c0226669cc1d2827f2ad28002f57b9911de4dbefae1a458a00662369cb5f9445841988b303fc2efc994169df59de02bf20

  • C:\Windows\OEC\QDLMJNKZUQ.dll

    Filesize

    3.3MB

    MD5

    cf16d09f528e62d9fd1f6ece077fea4a

    SHA1

    1101369d845fee1a1d63c2081cdb8049e1ebf091

    SHA256

    f33d07de17519eb516eadb4486a6b97f688381d43dd12f99e0dc3ef85e25c62d

    SHA512

    e905e887551e105bd6ab28731e1f8db1faa977bd3f5c86e05bf9a54fa176352d3aec2e3dd8ef11b62a2e0bc9978c589927a811c64c2f5f81caab7747fa58d535

  • C:\Windows\Survival_0.txt

    Filesize

    3B

    MD5

    a5ea0ad9260b1550a14cc58d2c39b03d

    SHA1

    f0aedf295071ed34ab8c6a7692223d22b6a19841

    SHA256

    f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04

    SHA512

    7c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74

  • C:\Windows\X\smss.exe

    Filesize

    7.5MB

    MD5

    fd76a8964eeffbc3ba0a2cf2de833b02

    SHA1

    e5c3649e07c00121b26293ae57be16071d21e982

    SHA256

    e20015cd6122389fa8f05c7b3b577207ae849af68447c695a728cd4595bf00ea

    SHA512

    045c7586b61e2908fb247eb9417d46200f775dcbe1f6ffc8f91c3ca2a4df4a097bd1cca27668dd3ba2f0888b417225f34d97777b7c386a40181da2489e96e90a

  • C:\Windows\reg.reg

    Filesize

    185B

    MD5

    d786c602ee4d1c98f13347b1421563da

    SHA1

    31726c39ffe4da9ebaf71cd1033ed88909006697

    SHA256

    62b603de263f2f1a0cde4c17ede80e935aff6ef0df2f03d90aee896f497ff616

    SHA512

    61a218d9bf1d6dd3e137fa048a5b343ebffd82eef93cff7852f9e47dc05d3cf50fb04834e97329135244af6e1975d7b6df57d9797a99bf210813f7ff7c2acb4e

  • C:\Windows\userid.txt

    Filesize

    5B

    MD5

    3719bc4d13977453b5d8c9d8f1e7462a

    SHA1

    c24505bcdb2b09980198730cd4791acad1796dcc

    SHA256

    197a4e2a0db3b79c8240827c9ea2ed1476c8a5ad7e22c02c832ba3a0a8bff9a1

    SHA512

    9bebfe9c377389f34afd15c2f4e2b027edfec3ec4883f0df09c8a0e4d22dbb9692eb8b4264c89165bc336c458e5488a7cd743bd5f99ae5d4b71a8b3c2805f1a5

  • memory/2068-0-0x0000000000400000-0x000000000058F000-memory.dmp

    Filesize

    1.6MB

  • memory/2068-2-0x0000000000B70000-0x0000000000CFF000-memory.dmp

    Filesize

    1.6MB

  • memory/2068-6-0x0000000005B60000-0x0000000006BC2000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-80-0x0000000000400000-0x000000000058F000-memory.dmp

    Filesize

    1.6MB

  • memory/2656-69-0x00000000054F0000-0x0000000006552000-memory.dmp

    Filesize

    16.4MB