Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 14:26

General

  • Target

    1ba49df189232267d14fca552a3f9852_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    1ba49df189232267d14fca552a3f9852

  • SHA1

    7dee9329f8d1b349949316459bd86a5e79c65082

  • SHA256

    0002e69005cc174bd43afffe3b1a06e604765d5b1a1c277a8c333d3331c0bae9

  • SHA512

    6054fe41f523538c32e71f2c51ae987b18e8ea93e3ae2a69d51c9c7173e11c02c96f4733e0e67cc1fd62f0cdf972d91b42fd0ea05156642d613d2a128c93561d

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN2FYaB:Dv8IRRdsxq1DjJcqfFFYw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ba49df189232267d14fca552a3f9852_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ba49df189232267d14fca552a3f9852_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2464

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f42be75e6ae9b5a928057fffb80f4b7b

    SHA1

    691a49868457f66e4b325d93b6b77d548aa8fb6a

    SHA256

    a626b0230bf1701410db1f5383ebb25ae5dd789180ec249015f8899a2f20d182

    SHA512

    5e8dd38e7edb1de9a887f89a749a9193dcbf237f5a641db8d7b6cc75278932f33b5e02061d9e2065c0762a9933a9cdab409e06d493192e6d57fb0e1ddd1b6b20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\search[4].htm
    Filesize

    130KB

    MD5

    39e279c1fdccf4702a8660478465eed4

    SHA1

    68cd8ab4c513e1e3f903c2d8307300c5480811cc

    SHA256

    36a3f67a1f0ddfa5d43e1b66b2731b02358fbd7fb96e54ec6be33d1960578480

    SHA512

    9e9d6e3ac17387f8ed0744f3ec6489be125a47d547a7b5fd48c604043e9d0b1d656f4833bb2cd60a1d22241a0910af984db7f02716a8c4602f8d4e9fec7abfe6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\RYM2SOB1.htm
    Filesize

    175KB

    MD5

    0cbfc8ed5326027e0b7f1f8a64aaeff1

    SHA1

    d231e81f23ce633cb19a94b8bd90666ca77529d3

    SHA256

    9d13940edffd4f2208667c319f675ed2ade8d953a5e4edb99e4d042bbece7a22

    SHA512

    24704b08e1e8a2a0351987e405be6f106ca992f3acf10c825a1603f851d0fd0e68aef07a1d5e6d435e7a4b23140b7f9d8a4f05d0baf18805b3cd9a8772efd9f3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\TPMSKD7Y.htm
    Filesize

    175KB

    MD5

    5a0c212516fa7ae5d6432917f0882737

    SHA1

    5c36eddb20ef7cfd55f8ee220b88b9ea2407e819

    SHA256

    45097d50422a82e7638824110072aa3045fd26316375db827c2554195009819b

    SHA512

    62ee58ccc6350c679fd91373e5890f045f98d855be00115750205cb38073962ce2510e671985664f69581bd4bb8f0df06ec1ca7d75ee7d6d980564179527d039

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\results[2].htm
    Filesize

    1KB

    MD5

    211da0345fa466aa8dbde830c83c19f8

    SHA1

    779ece4d54a099274b2814a9780000ba49af1b81

    SHA256

    aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5

    SHA512

    37fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\search[3].htm
    Filesize

    168KB

    MD5

    ce20f1a117209454207adac65d9a936b

    SHA1

    5303dd5da8e07f72d1345d28ba98a5362be53137

    SHA256

    27e1fd16c1066a1bf7587854597849badc624c0a137c5f5e937a7d958896dbfb

    SHA512

    7af72f94e45307537791252e34e4131001997c56b1a1af6b53945804a24a0c20f6e89b7897886628ef8aa23becc4a3b566f6e4f3af520fe268f5358ce97fcb5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IW68H88T\results[2].htm
    Filesize

    1KB

    MD5

    ee4aed56584bf64c08683064e422b722

    SHA1

    45e5ba33f57c6848e84b66e7e856a6b60af6c4a8

    SHA256

    a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61

    SHA512

    058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\search[3].htm
    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\Cab2547.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar25EB.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp34D8.tmp
    Filesize

    28KB

    MD5

    9c3e26bc4e1305ef3b47708fd0e46766

    SHA1

    6dd729c8e8623410496cc45bc9cab480911e2fa7

    SHA256

    85276e443d4b19513e178c8d6a44d5880b5791de5454e5a1fddd97dc1ff7b00c

    SHA512

    652c83b6718871efbacdf4b4a8f86ffdc363f10d00d0448e161eff13d82f36f9d419e3c6ecd5a32fb4b18971c3888e636b0d3591b487e99e4273514533f1ec71

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    f0ca0694798d9c87287642562c27a8c7

    SHA1

    5751c3d002e0e8833b1c668c8cb7fa840388b9fd

    SHA256

    26f17300115a28a6b060bc3c09a0b24d534b6cb3941a0199eaf87d136b5ec892

    SHA512

    cf80c525fe0d0f3acb3f9c1fc5eb9bf9499e201292e796776a6361a3a7e66c29c43f1fbc528ddbca7a470cfb2a923ce03e7c41d39832871ad2fc3f4de1a04594

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    5a347938df08c9cc092749a71adc5ae3

    SHA1

    2ccbb778cd3359dc0aae4a2ea5d7861835c8c09e

    SHA256

    654dbc080dcffc91dec6bb7801c34d73fce2b2ca564a478e23e3d616e5916ab1

    SHA512

    cdd1897674f1c8fc10fa226c92d058bdd4b165681a0b95b7bfc2f05ae8ba0944f166d8a7481b793ea447d7b0a99847e512dc65670ec82b575b6a6c2c6d3845bc

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    a028cb2e9f7aaa401eb3086a9853ee0e

    SHA1

    e3488fd2e69548916def46c4cf6f0e820a11fea4

    SHA256

    d93ace6f030637bc2aab81a3fdd4cb09ddb3dcc70e492ac271bec28641bddcc1

    SHA512

    4bafa1be3d4fe3c563780211dfbfd83cb8ffeff5f002537250bd32b629ea026530a6def71f5f5c0c8639beb4e67747a1ba6d6f3d6beb0b1b5c24e26dacb4dac7

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    33b5be817b8bcd7370455add12fd497e

    SHA1

    a330234ebb907106cd74ac99130ccfdf125033d9

    SHA256

    e130a270514ce1923378f666b4422fca3950a09ef2593909bdd20c554ffdf303

    SHA512

    6508ff54f7356cd8617c11a31b42e9ffc2e9b8ea7e4268e3e66289c286293d6d47a8e01615a9b14899f9af9fa886eb495f5f1ef2e46e437ceb11fa1608f926fd

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1680-65-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-24-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/1680-43-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-10-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/1680-2-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-9-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/1680-69-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-17-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-76-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-288-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-81-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/1680-25-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/1680-41-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/2464-44-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-77-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-37-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-32-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-30-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-82-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-42-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-23-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-84-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-289-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-18-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-72-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-70-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-66-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2464-11-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB