Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 07:23

General

  • Target

    6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    6dbbc38e0855d4e72b4926d9e12598e6

  • SHA1

    77afbbced59f720992f948e2fa81d2bda3692697

  • SHA256

    9befa4ef0d9cf3068b4ed3d5e3771847aeedf74979a55c49e85a85eee1cb83a9

  • SHA512

    1851e205793d3d57ac719dfb22eb3e0f8b0e170d0e650662007801cb4f64c48eea5a4338e861f69b06f909523f896631b2ec8831fbaebfad8ccd7230f3a69c9b

  • SSDEEP

    24576:eqq1V8k+0keaB1CyKu2wmEC6IZgnPDSPE1J3HCP8uIhCZ:ejQw4M/u2wFpnPDIE1ZCP8ueO

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:348
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C net stop AdobeFlashPlayerHash
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\net.exe
        net stop AdobeFlashPlayerHash
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop AdobeFlashPlayerHash
          4⤵
            PID:1636
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C Sc delete AdobeFlashPlayerHash
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\SysWOW64\sc.exe
          Sc delete AdobeFlashPlayerHash
          3⤵
          • Launches sc.exe
          PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C TIMEOUT 2
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\SysWOW64\timeout.exe
          TIMEOUT 2
          3⤵
          • Delays execution with timeout.exe
          PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C Sc create AdobeFlashPlayerHash binpath= C:\Windows\HhSm\Client.exe start= auto
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Windows\SysWOW64\sc.exe
          Sc create AdobeFlashPlayerHash binpath= C:\Windows\HhSm\Client.exe start= auto
          3⤵
          • Launches sc.exe
          PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C net start AdobeFlashPlayerHash
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\net.exe
          net start AdobeFlashPlayerHash
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start AdobeFlashPlayerHash
            4⤵
              PID:2656
      • C:\Windows\HhSm\Client.exe
        C:\Windows\HhSm\Client.exe
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2412

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\HhSm\Client.exe

        Filesize

        1.2MB

        MD5

        baf2c6ff6a22b75e28d0181dad88c8b8

        SHA1

        98ba3a31f648ce0c4874e77444fab090e9742cd9

        SHA256

        bd792fc304c010dc963dcec7083c2e7877fdd35f51b2a129e586d3464f698db0

        SHA512

        0d773a9d6bb4fc96ccc813910c136eb636d59193ae86f0dfd274147798cfa40048196e34b72b7d149df24913d22c239c5cb609be539e2f8dc633f4579790862c

      • C:\Windows\HhSm\parameters.ini

        Filesize

        223B

        MD5

        49cec6a3049fb57389b741649c4e609c

        SHA1

        5d8083cf3028c111e3936e1f78b00194c5e04288

        SHA256

        9f313143048df4a358c6904659370408d4425733247fef8885f49c11b02b4f65

        SHA512

        7cf0fdcaa55d6b4f48b224435e508cd29bca6737a8a2391e094a57ef9f1791c2c5c54f076fb2f991a378bb7ae71a818277d748756b7b3124e3e0dc5502fdde9c

      • C:\Windows\HhSm\parameters.ini

        Filesize

        193B

        MD5

        77803e8762552660a93ea830f0da6487

        SHA1

        fef71d9654b182d39ce3cdd220bd22a4f7662e2a

        SHA256

        85af2b2ea060c27589dc84d590ea4cb0e36f5afbfb7bcfa095b00037b02a2b24

        SHA512

        59a6b58e0535d4498bf17f3699bb55138aacc2dc68b73bba1b755365f885a0f23c04639146af7ec56ccf26793183fc004c1a70db27a6599d18474e8a38d6a0b3

      • \Users\Admin\AppData\Local\Temp\nst11FC.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        b5a1f9dc73e2944a388a61411bdd8c70

        SHA1

        dc9b20df3f3810c2e81a0c54dea385704ba8bef7

        SHA256

        288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884

        SHA512

        b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8

      • memory/2412-56-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-59-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-54-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-55-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-24-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-57-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-58-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-53-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-60-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-61-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-62-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-63-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-64-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-65-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2412-66-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB