Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 15:23

General

  • Target

    35403ba7db7ea0c986ee1fe8b83e9828_JaffaCakes118.exe

  • Size

    1009KB

  • MD5

    35403ba7db7ea0c986ee1fe8b83e9828

  • SHA1

    408e9bcd5b5482cb56b34262aa7630b820d52013

  • SHA256

    16e99733056af25e681f4b80bd22d211d3ca13d46da3dcd5057e8f0abbd5d7de

  • SHA512

    d21f92719104ab1504b70d5de3a0f92c1387f95723d97dcb3aadafb8df4b5d1f39e4bcc5cdeaed74f4deeeff338ff4bb7c88e121cb2fd576770d28a57732be6a

  • SSDEEP

    12288:exQyHcoCUyZtwAvAs4wTCyrPT0yq0VezaOvoJpaz/g/J/vVoS:oHfty/wAvN7lry0VeH8az/g/J/No

Score
10/10

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Drops file in Drivers directory 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35403ba7db7ea0c986ee1fe8b83e9828_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\35403ba7db7ea0c986ee1fe8b83e9828_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\sc.exe
      sc config ekrn start= disabled
      2⤵
      • Launches sc.exe
      PID:2064
    • C:\Windows\SysWOW64\sc.exe
      sc config rsravmon start= disabled
      2⤵
      • Launches sc.exe
      PID:2316
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im ekrn.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1184
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im egui.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2528
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im 360sd.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2900
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im 360sd_se.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2988
    • C:\Windows\SysWOW64\cacls.exe
      cacls C:\Users\Admin\AppData\Local\Temp\ /e /p everyone:f cacls "C:\Windows" /e /p everyone:f
      2⤵
        PID:2688
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\system32\a18467stva41a.dll, droqp
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 320
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:1520
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        2⤵
        • Gathers network information
        PID:2536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 296
        2⤵
        • Program crash
        PID:2756

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\a18467stva41a.dll

            Filesize

            18KB

            MD5

            cf6055f7ab2feaec8983e16b8455d7bf

            SHA1

            49f091431cb22a6ffbd0db378f5952eeec5b7575

            SHA256

            d37142c8bdf9a835170c058155cea99d30ca6b48d048d6ff5e458297c993bb6f

            SHA512

            9cc71bb29cf6915301b101355e4d15bc85420ea4247249fee6b2c7a4a30e995b5e4b929f23e7e874a8f77326c65615474fcd346a612e9b8371247b0e3f75b10a

          • memory/1960-13-0x0000000010000000-0x000000001000C000-memory.dmp

            Filesize

            48KB