Analysis

  • max time kernel
    156s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 12:46

General

  • Target

    ff4ead85d03c52f368ba833d9dc58d01_JaffaCakes118.dll

  • Size

    670KB

  • MD5

    ff4ead85d03c52f368ba833d9dc58d01

  • SHA1

    4ad6da8977108452584c4bc6191f0d91ad3ff94b

  • SHA256

    2dff68623defa4edb64b514ec769e9ff3448b3ae1c0768e784cd305bfce2f91c

  • SHA512

    f4019d6a7cbdaa5ae66dcee8bd44b13fed9899392030cf189f4a05a6c230188829926b658a75e2bab48635006491db4aceb605ef7ef6b5f81c2cf261aa0fcf9f

  • SSDEEP

    6144:DRD4MlqMABEN37jt9ZA3H8DaLCw0w6LhMA8aF8pVqEDFqf1b/3C:DRZQOrcHwwH6tMzaFg8EDcf1r3C

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff4ead85d03c52f368ba833d9dc58d01_JaffaCakes118.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4528
  • C:\Windows\system32\ApproveChildRequest.exe
    C:\Windows\system32\ApproveChildRequest.exe
    1⤵
      PID:3972
    • C:\Windows\system32\AssignedAccessGuard.exe
      C:\Windows\system32\AssignedAccessGuard.exe
      1⤵
        PID:4060
      • C:\Windows\system32\ntprint.exe
        C:\Windows\system32\ntprint.exe
        1⤵
          PID:3960
        • C:\Windows\system32\bdechangepin.exe
          C:\Windows\system32\bdechangepin.exe
          1⤵
            PID:3996
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\OkMJ.cmd
            1⤵
              PID:3172
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{2876edf9-11ce-6726-5bde-f751084e1399}"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:548
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{2876edf9-11ce-6726-5bde-f751084e1399}"
                2⤵
                  PID:3500
              • C:\Windows\system32\fixmapi.exe
                C:\Windows\system32\fixmapi.exe
                1⤵
                  PID:2284
                • C:\Windows\system32\gpscript.exe
                  C:\Windows\system32\gpscript.exe
                  1⤵
                    PID:4048
                  • C:\Windows\system32\DisplaySwitch.exe
                    C:\Windows\system32\DisplaySwitch.exe
                    1⤵
                      PID:4216
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\KWot.cmd
                      1⤵
                      • Drops file in System32 directory
                      PID:4232
                    • C:\Windows\System32\eventvwr.exe
                      "C:\Windows\System32\eventvwr.exe"
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2724
                      • C:\Windows\system32\mmc.exe
                        "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc"
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:3332
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4012 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:4656

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\2QL3DA1.tmp

                        Filesize

                        675KB

                        MD5

                        f9918a4bb9adcb48fffb20a8fa1178fd

                        SHA1

                        73058ba6d52729cad2225f7c476701b2a6f5dd67

                        SHA256

                        0d15444c586679f96efa62bb12ff1043d0640b5d99106e72ef96de6ae4e192d3

                        SHA512

                        3558805eec092a455ba06264dfb8c79d7ad345908e5fe115bd0fb8e3fe83d305c5821af8efd6aa18c62678d07b96fcf6d69f39a79f906d1e7be900bb0409f63e

                      • C:\Users\Admin\AppData\Local\Temp\KWot.cmd

                        Filesize

                        198B

                        MD5

                        4db23e984a3216e30ba432deebcb457b

                        SHA1

                        87df4473fa88291f15b2876f038ef0a40c98ef51

                        SHA256

                        052686cae70c4342e0a0740a28888ec6e5492bf608d8ac7e0aa3edc569436599

                        SHA512

                        f618a9554f36f565dbd68ed253f432b757d63a6a6d863228bd78aa3c5f2ab63d98e9dc2015ac0b9a779349ba8fe4f791e8f3320b35aff13e797f2b9a66bd42f8

                      • C:\Users\Admin\AppData\Local\Temp\OkMJ.cmd

                        Filesize

                        237B

                        MD5

                        26da540432d3e2552ab17ca17db44bfe

                        SHA1

                        0614367c4319e39fa431f2cec77ca683d311e151

                        SHA256

                        43e15969c15d06a2ab89f601da9f53bef97c9be91c2e22fc8671fc89064965a4

                        SHA512

                        65e6276bdfec4df36fa4f192925908b722764651293b8c868686cec5f6e93e6fcdba223cbb16201b06b27d02fd63fda4be1325d25de2cf77f67d3558d039d12d

                      • C:\Users\Admin\AppData\Local\Temp\V3217.tmp

                        Filesize

                        947KB

                        MD5

                        bca442a12be398d16744f8727f8a3f2b

                        SHA1

                        8c4bfff52d32d78c64b79037bb1356549c2f8ec4

                        SHA256

                        e73955728c9a1e7ccfdab2724206584adea4818d5d0a5937c26a1f9a186ff189

                        SHA512

                        31741ce1a94caf1b196817bbb1cf633f03d1588e14fa0bf1aa060c80705477f882a4b99af5e965ebf9943ac3055abb293e1125494f560f6345945b219d6c1268

                      • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xcdbzlxvqxxhz.lnk

                        Filesize

                        938B

                        MD5

                        fdb79ad6213b23566abef0350eaf870a

                        SHA1

                        9b9fb2e2dd128a6a483886c872f6f87001a852b9

                        SHA256

                        163459fec075dcc60e2df98bed4834594cc354dc9f439b0247b3d3c12ce4e026

                        SHA512

                        399631db693dc2ce31b7a4881f49c884e4ace00f5b41c1feee4a341a8f067073303ef6bff46188eebcca410e7a5583d875dc5386c860b82e11aacc971def3bce

                      • C:\Users\Admin\AppData\Roaming\V5U5lp3\bdechangepin.exe

                        Filesize

                        373KB

                        MD5

                        601a28eb2d845d729ddd7330cbae6fd6

                        SHA1

                        5cf9f6f9135c903d42a7756c638333db8621e642

                        SHA256

                        4d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6

                        SHA512

                        1687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d

                      • memory/3300-37-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-8-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-10-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-11-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-12-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-13-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-14-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-16-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-20-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-19-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-18-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-17-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-15-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-21-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-22-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-28-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-3-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3300-39-0x00007FFA25AE0000-0x00007FFA25AF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3300-7-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-9-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3300-5-0x00007FFA24B5A000-0x00007FFA24B5B000-memory.dmp

                        Filesize

                        4KB

                      • memory/3300-48-0x000000007C000000-0x000000007C0B0000-memory.dmp

                        Filesize

                        704KB

                      • memory/3332-143-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-171-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-220-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-67-0x00007FFA05570000-0x00007FFA06031000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3332-72-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-111-0x00007FFA05570000-0x00007FFA06031000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3332-119-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-124-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-209-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-210-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-157-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-174-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-175-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-176-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3332-205-0x000000001CAB0000-0x000000001CAC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4528-6-0x0000000064BE0000-0x0000000064C90000-memory.dmp

                        Filesize

                        704KB

                      • memory/4528-1-0x0000000064BE0000-0x0000000064C90000-memory.dmp

                        Filesize

                        704KB

                      • memory/4528-0-0x00000225E9490000-0x00000225E9493000-memory.dmp

                        Filesize

                        12KB