Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 17:36

General

  • Target

    JaffaCakes118_8ae2da00f8788ccb24c788c63f557304.dll

  • Size

    78KB

  • MD5

    8ae2da00f8788ccb24c788c63f557304

  • SHA1

    15f6cc2760226f2cb06aabb312fbaa8f3b24ced3

  • SHA256

    53e749d3a8e05369d191e58382574c47a7ee5a61ae016230ad60c7fb8b7b2520

  • SHA512

    98c5f820d8ac6f09388c5d2c2750307597554b5497be90b536dd090e522b23dbdf5ff19cadcbf784bc8f2c125badbe378e88c0347af86acff6fc89afa8fbf854

  • SSDEEP

    1536:j4nQuutahYTG+JQXpY+dyUdMMZ6G3m3zTaG3KM:jwQuutahmQW+dyUF3mXacKM

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae2da00f8788ccb24c788c63f557304.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae2da00f8788ccb24c788c63f557304.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\F44TGMYMDK.EXE
        "C:\F44TGMYMDK.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s "C:\Windows\RVWVLYCAVB.dll"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2740
        • C:\Users\Admin\AppData\Local\Temp\MendicantMendicant.exe
          "C:\Users\Admin\AppData\Local\Temp\MendicantMendicant.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1844
        • C:\Users\Admin\AppData\Local\Temp\MendicantMendicant.exe
          C:\Users\Admin\AppData\Local\Temp\MendicantMendicant.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\F44TGMYMDK.EXE

    Filesize

    46KB

    MD5

    a098457d5ef689d34a878d0359eb999c

    SHA1

    f119b0f08c9e6bd16c6065eb464aa7c3163a8e0a

    SHA256

    1fe11499f2d52b374b68e85cdb04d8779c8aec6fede58925286a907d13ba4be7

    SHA512

    22bf5d8de1e2fd27cfbba592a7ce50473dbdba87d92b4a41de645e7f0a3175a25dbf5ba0ec8f22e3ac6a29245c42a54b9cd7fd11d47331634edaa3d64ff487d3

  • C:\Windows\RVWVLYCAVB.dll

    Filesize

    78KB

    MD5

    8ae2da00f8788ccb24c788c63f557304

    SHA1

    15f6cc2760226f2cb06aabb312fbaa8f3b24ced3

    SHA256

    53e749d3a8e05369d191e58382574c47a7ee5a61ae016230ad60c7fb8b7b2520

    SHA512

    98c5f820d8ac6f09388c5d2c2750307597554b5497be90b536dd090e522b23dbdf5ff19cadcbf784bc8f2c125badbe378e88c0347af86acff6fc89afa8fbf854

  • \Users\Admin\AppData\Local\Temp\MendicantMendicant.exe

    Filesize

    28KB

    MD5

    927476200feeb6160af47839940f10cc

    SHA1

    77dbd1d864d608a59fe5be14c10df1682de40486

    SHA256

    7f3bcfae359fce0e86d1f0b8881d204b3f4bea37b993c06d8a42d3771d92c2da

    SHA512

    42e9c462242865567d1b5429d45b561535c1fd732ba62ef1c773e8f446663adb5cf81bf27c3dee16458f1e56397911ba0d1b54db372f619f536e2161c1121c9f