Analysis

  • max time kernel
    136s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 01:03

General

  • Target

    693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    693ad4f8f4fb28e4f281bbc6e514e8f3

  • SHA1

    3cb5bb6b20165ab404f9109e6a37d19b76e48a49

  • SHA256

    16adf37262f86f735d64736a65a5fc3d4d6bc8b59761308d9d7d158e31142d23

  • SHA512

    81b90394a7393764013df3d8cc31247018a5700fa111ac34475652d0723f28f84ca16c6b42255f5a419ce9e2bfc6414c39a131ffdbdbbeb00fd367e9bb374012

  • SSDEEP

    6144:F4gKygecqPkZm5hzLf8bJZ7Jp31Q+b5A/oiKs7TLYC0JGRqSw:GpyRcqs85ONZ7Jlu/ovu4C0JFSw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Roaming\NvGfeService.exe
      "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Roaming\NvGfeService.exe
        "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe
          "C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Users\Admin\AppData\Roaming\NvGfeService.exe
            "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:792
            • C:\Users\Admin\AppData\Roaming\NvGfeService.exe
              "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1900
              • C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe
                "C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe"
                7⤵
                • Executes dropped EXE
                PID:2152
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2408
                • C:\Windows\SysWOW64\PING.EXE
                  ping 1.1.1.1 -n 1 -w 1000
                  8⤵
                  • Runs ping.exe
                  PID:2676
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2448
          • C:\Windows\SysWOW64\PING.EXE
            ping 1.1.1.1 -n 1 -w 1000
            5⤵
            • Runs ping.exe
            PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\NvGfeService.exe

    Filesize

    298KB

    MD5

    693ad4f8f4fb28e4f281bbc6e514e8f3

    SHA1

    3cb5bb6b20165ab404f9109e6a37d19b76e48a49

    SHA256

    16adf37262f86f735d64736a65a5fc3d4d6bc8b59761308d9d7d158e31142d23

    SHA512

    81b90394a7393764013df3d8cc31247018a5700fa111ac34475652d0723f28f84ca16c6b42255f5a419ce9e2bfc6414c39a131ffdbdbbeb00fd367e9bb374012

  • memory/792-117-0x0000000000D90000-0x0000000000DE0000-memory.dmp

    Filesize

    320KB

  • memory/1964-0-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

    Filesize

    4KB

  • memory/1964-1-0x0000000000F00000-0x0000000000F50000-memory.dmp

    Filesize

    320KB

  • memory/1964-2-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

    Filesize

    4KB

  • memory/2152-210-0x0000000000360000-0x00000000003B0000-memory.dmp

    Filesize

    320KB

  • memory/2196-111-0x00000000013C0000-0x0000000001410000-memory.dmp

    Filesize

    320KB

  • memory/2912-103-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3024-59-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-47-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-35-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-17-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-49-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-75-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-77-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-73-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-71-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-69-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-67-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-65-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-63-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-61-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-15-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-57-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-55-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-53-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-51-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-14-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-45-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-43-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-41-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-39-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-37-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-33-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-31-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-29-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-27-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-25-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-23-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-21-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-19-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/3024-102-0x0000000074E70000-0x000000007555E000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-13-0x0000000074E70000-0x000000007555E000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-12-0x00000000002A0000-0x00000000002C4000-memory.dmp

    Filesize

    144KB

  • memory/3024-11-0x0000000074E70000-0x000000007555E000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-10-0x0000000000BE0000-0x0000000000C30000-memory.dmp

    Filesize

    320KB