Analysis

  • max time kernel
    34s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 01:08

General

  • Target

    fb951698d0cc2c871db6a5488c692c74_JaffaCakes118.exe

  • Size

    465KB

  • MD5

    fb951698d0cc2c871db6a5488c692c74

  • SHA1

    4400b337705ea4edd16408b7e97ae7b39c73766c

  • SHA256

    17fce275fe1d225893244ada5f9bf1dc0efd77ea8845d4b09bcaddcc5caa0647

  • SHA512

    7c5c31fe255e0901b02854d68ba2d5a26c9b71d5a0cf412d84c210cce0f715a2dd658f3d8034a34af0e07b41448fe4c442031e9d15a118685029bca69ee2738f

  • SSDEEP

    12288:bCzpDgXfM4dfMAJUouZ+jkfn/q3C+0+zO2:bCGPMefM1g4fn/q3D7zZ

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 48 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb951698d0cc2c871db6a5488c692c74_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb951698d0cc2c871db6a5488c692c74_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\cb.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\cb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2108
    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\1EuroP.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\1EuroP.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2592
    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\2IC.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\2IC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      PID:3068
    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\3E4U - Bucks.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\3E4U - Bucks.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 284
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2568
    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\6tbp.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\6tbp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\mfopxis0.dll",Startup
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2620
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Users\Admin\AppData\Local\mfopxis0.dll",iep
          4⤵
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1784
    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\IR.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\IR.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Security Center"
        3⤵
          PID:2632
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Security Center"
            4⤵
              PID:1664
          • C:\Windows\SysWOW64\sc.exe
            sc config wscsvc start= DISABLED
            3⤵
            • Launches sc.exe
            PID:2732
          • C:\Windows\SysWOW64\net.exe
            net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
            3⤵
              PID:2916
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
                4⤵
                  PID:2192
              • C:\Windows\SysWOW64\sc.exe
                sc config SharedAccess start= DISABLED
                3⤵
                • Launches sc.exe
                PID:816
              • C:\Users\Admin\AppData\Roaming\nq17g.exe
                C:\Users\Admin\AppData\Roaming\nq17g.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1000
                • C:\Users\Admin\AppData\Roaming\nq17g.exe
                  C:\Users\Admin\AppData\Roaming\nq17g.exe -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
                  4⤵
                    PID:2052
                • C:\Windows\SysWOW64\Rundll32.exe
                  Rundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf
                  3⤵
                    PID:1924
                    • C:\Windows\SysWOW64\runonce.exe
                      "C:\Windows\system32\runonce.exe" -r
                      4⤵
                        PID:1180
                        • C:\Windows\SysWOW64\grpconv.exe
                          "C:\Windows\System32\grpconv.exe" -o
                          5⤵
                            PID:936
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c C:\Users\Admin\AppData\Roaming\rjxrku1pp.bat
                        3⤵
                          PID:1908

                    Network

                    MITRE ATT&CK Matrix ATT&CK v13

                    Persistence

                    Boot or Logon Autostart Execution

                    1
                    T1547

                    Registry Run Keys / Startup Folder

                    1
                    T1547.001

                    Pre-OS Boot

                    1
                    T1542

                    Bootkit

                    1
                    T1542.003

                    Privilege Escalation

                    Boot or Logon Autostart Execution

                    1
                    T1547

                    Registry Run Keys / Startup Folder

                    1
                    T1547.001

                    Defense Evasion

                    Modify Registry

                    2
                    T1112

                    Pre-OS Boot

                    1
                    T1542

                    Bootkit

                    1
                    T1542.003

                    Discovery

                    System Information Discovery

                    2
                    T1082

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\2IC.exe
                      Filesize

                      182KB

                      MD5

                      3856eac2db9b2da12862e83041c1f74e

                      SHA1

                      b34ddd2c894a4e5a6f63b352393cc72c7f8772d7

                      SHA256

                      6b341b1017f9d12b355ee62e9d39abe4a82bfc054a70a970eb3ee21e2893a5fc

                      SHA512

                      be47d04df15004f84a9296d0918dc575136f76bf2189711b5149aa171e3d15ce2ae199f199ebf7e93a92b151de7ec9b63e755c2f6c5d2008973986e9e56fa9ca

                    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\IR.exe
                      Filesize

                      61KB

                      MD5

                      19e7295aa0572da1b8c5e26524f2a2ac

                      SHA1

                      36b0bb4b9af19ac9f540c82e274f428c8d0daf4e

                      SHA256

                      50ba82a3a04ab9290447d8767c3e2e744cf46bf503e830bc41d770fde6e338e2

                      SHA512

                      686c1127e2d838f793a2aee529a325307b709829355df33607625d5dcef4bed1415cf0ccc3b62db0e52e6d29fc967296a7f4a3c92e2d965eece99b09c44a390c

                    • C:\Users\Admin\AppData\Local\Temp\nsy1660.tmp\cb.exe
                      Filesize

                      3KB

                      MD5

                      46e07fd3a40760fda18cf6b4fc691742

                      SHA1

                      53ee1a754bf5e94fa88a6ab8bb6120b4011afcfa

                      SHA256

                      bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be

                      SHA512

                      ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd

                    • C:\Users\Admin\AppData\Local\mfopxis0.dll
                      Filesize

                      124KB

                      MD5

                      54bb1c8eea5315883b1236798e7ffe64

                      SHA1

                      06d44da5b51bcc8dd287e4365e4340fc04f38a81

                      SHA256

                      fa28f90b85bb5ef61c63fba9112217ab34b433df94a5a490075bf1cdb3a5bb4b

                      SHA512

                      64e0a8ddb9026cd20d0f1d3f0bace3a7f8b635e05d7e8fc92c9a34b0dd595101cda6ba2c7457db794d5b114f0a4c75431b85975080b3c6fbd7a274ab2a39b93c

                    • C:\Users\Admin\AppData\Roaming\mdinstall.inf
                      Filesize

                      410B

                      MD5

                      3ccb3b743b0d79505a75476800c90737

                      SHA1

                      b5670f123572972883655ef91c69ecc2be987a63

                      SHA256

                      5d96bec9bc06fd8d7abc11efbb3cb263844ee0416910f63581dd7848b4e1d8dd

                      SHA512

                      09b1cdd4393f515f7569fbccc3f63051823ed7292b6e572bc9a34e4389b727b2914b22118e874864ccb32ef63016b2abd6d84510fd46fdee712fd84be59c114e

                    • C:\Users\Admin\AppData\Roaming\rjxrku1pp.bat
                      Filesize

                      154B

                      MD5

                      f73ab3a2b1fffcec6f52bb7ecd7cebac

                      SHA1

                      5b86ae141dbf1e65ffb1cda1e28d6cb5c54cc7bd

                      SHA256

                      ef0c3405ce8b7e6c83d96ed721f52754c9a97e38a2934098744acfb81bdb15a7

                      SHA512

                      429654191b118d77ac06b1247d38f6838338688fc9976b5296209fadd01c11c18ad102b95c4773346461420ee2e291328d5074c9b1530b8520ffc4747753c8c3

                    • \Users\Admin\AppData\Local\Temp\nsy1660.tmp\1EuroP.exe
                      Filesize

                      112KB

                      MD5

                      396674d55bf8c7cc2e789dbef158a9f0

                      SHA1

                      5be48faed298b35cd26c48e37043058f7df03ffe

                      SHA256

                      6d9c4e2f2e80d66140360dd2a2ce40574a26ff88da8f48d244b99d64baa469fd

                      SHA512

                      8d43711d9a31eba4a3ff3e3495a1e13f89fc28c8558c53d46d70f329a30c32838f787f1aefc66fba582181ac6ca9fcd535160f587d18f66560b5834ca7dedcde

                    • \Users\Admin\AppData\Local\Temp\nsy1660.tmp\3E4U - Bucks.exe
                      Filesize

                      27KB

                      MD5

                      5f6c6b5e491ac60e088adba6dd5791c2

                      SHA1

                      292f4b81b3eee53877c672faf540aceeb2fc881f

                      SHA256

                      b010d2d5cdee46b1b97b88aa48968ffd34f6e3e382b250c98f2e1a89c950e018

                      SHA512

                      59c15d1a3f8d14eb441bb6e187cd91eaa13114afa1d8220aa7d08e259ee28af6bab92258b624d9824944b1776f916b6b551f3c3be982262d28b5330c7ba28252

                    • \Users\Admin\AppData\Local\Temp\nsy1660.tmp\6tbp.exe
                      Filesize

                      124KB

                      MD5

                      5545a2895e1f4f0e91619b551d6d4a9c

                      SHA1

                      ad2b8aec4af59be2e7ef8c05bdb98ce3049f7b14

                      SHA256

                      81e06e0b3107ffffa753573fa59e1a4125ed711290fc4bae76a0068999c36ca0

                      SHA512

                      54d595384ded58818e6cdaf1f3dbfc38dfd02e1bfa8de6caa4ff18183261067b6331dc4ef9ede9261cde2739067b77b94a465395e1ded1be94bd611a1d215277

                    • memory/1000-171-0x0000000005A00000-0x0000000005A30000-memory.dmp
                      Filesize

                      192KB

                    • memory/1000-125-0x00000000001C0000-0x00000000001F0000-memory.dmp
                      Filesize

                      192KB

                    • memory/1000-136-0x0000000003810000-0x0000000004872000-memory.dmp
                      Filesize

                      16.4MB

                    • memory/1000-124-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/1000-143-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/1784-164-0x0000000002740000-0x0000000002780000-memory.dmp
                      Filesize

                      256KB

                    • memory/2052-176-0x00000000001C0000-0x00000000001F0000-memory.dmp
                      Filesize

                      192KB

                    • memory/2052-172-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/2052-174-0x00000000001C0000-0x00000000001F0000-memory.dmp
                      Filesize

                      192KB

                    • memory/2052-175-0x00000000001C0000-0x00000000001F0000-memory.dmp
                      Filesize

                      192KB

                    • memory/2052-177-0x00000000036A0000-0x0000000004702000-memory.dmp
                      Filesize

                      16.4MB

                    • memory/2400-100-0x00000000025A0000-0x00000000025E0000-memory.dmp
                      Filesize

                      256KB

                    • memory/2400-127-0x0000000010000000-0x000000001001F000-memory.dmp
                      Filesize

                      124KB

                    • memory/2400-78-0x0000000010000000-0x000000001001F000-memory.dmp
                      Filesize

                      124KB

                    • memory/2476-160-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-167-0x0000000000230000-0x0000000000260000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-116-0x0000000005B30000-0x0000000005B60000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-97-0x0000000000230000-0x0000000000260000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-104-0x0000000003840000-0x00000000048A2000-memory.dmp
                      Filesize

                      16.4MB

                    • memory/2476-101-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-139-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-98-0x0000000000230000-0x0000000000260000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-123-0x0000000005B30000-0x0000000005B60000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-85-0x0000000000230000-0x0000000000260000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-165-0x0000000000230000-0x0000000000260000-memory.dmp
                      Filesize

                      192KB

                    • memory/2476-166-0x0000000000400000-0x0000000000430000-memory.dmp
                      Filesize

                      192KB

                    • memory/2592-144-0x0000000000400000-0x0000000000421000-memory.dmp
                      Filesize

                      132KB

                    • memory/2592-126-0x0000000000400000-0x0000000000421000-memory.dmp
                      Filesize

                      132KB

                    • memory/2592-83-0x0000000000400000-0x0000000000421000-memory.dmp
                      Filesize

                      132KB

                    • memory/2620-169-0x0000000002A60000-0x0000000002AA0000-memory.dmp
                      Filesize

                      256KB

                    • memory/2620-102-0x0000000002A60000-0x0000000002AA0000-memory.dmp
                      Filesize

                      256KB

                    • memory/2620-140-0x0000000010000000-0x000000001001F000-memory.dmp
                      Filesize

                      124KB

                    • memory/2620-96-0x0000000010000000-0x000000001001F000-memory.dmp
                      Filesize

                      124KB

                    • memory/2824-79-0x0000000002410000-0x0000000002640000-memory.dmp
                      Filesize

                      2.2MB

                    • memory/2824-82-0x0000000000A40000-0x0000000000A70000-memory.dmp
                      Filesize

                      192KB

                    • memory/3068-105-0x0000000000400000-0x0000000000446000-memory.dmp
                      Filesize

                      280KB

                    • memory/3068-106-0x0000000000450000-0x0000000000496000-memory.dmp
                      Filesize

                      280KB

                    • memory/3068-107-0x0000000000400000-0x0000000000446000-memory.dmp
                      Filesize

                      280KB