Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 11:13

General

  • Target

    84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe

  • Size

    9.1MB

  • MD5

    84066d47170e1e02642690be0ca6acd4

  • SHA1

    15d3b330c66c6bcf01e5b7574dc71b61ea2ca48f

  • SHA256

    d6da9cd08fda82f36e277fcb9d98e1a0444d1cd3a3a71c6cf262e53213f7c1e1

  • SHA512

    e386515f521cc63dd3561b260703e16cbe793315e9097e0eb23e8256dd40364da38007db1c2149ff4682d7df61c889f2de1c05821351fd8a1e87514ca70a0898

  • SSDEEP

    196608:h0bDi3QWpZJdsYap39xyiSRQ6mUpUWiHoZyEAZ+FcAjoSZF:h0bW3QWDa0iSinUpUWiHowMcWoO

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c echo hi
      2⤵
        PID:1736
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\System32\wscript.exe" C:\\ProgramData\\ppqvcxqjwx.js
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c rd /S/Q C:\ProgramData\u55yu8
          3⤵
            PID:2672
          • C:\ProgramData\tajm8\7za.exe
            "C:\ProgramData\tajm8\7za.exe" e C:\ProgramData\n3pn3b.zip -pvkd -y -oC:\ProgramData\u55yu8
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2500
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c move /Y "C:\ProgramData\u55yu8" "C:\ProgramData\VkontakteDJ"
            3⤵
              PID:3036
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Delete /TN VK_DJ /F
              3⤵
                PID:3056
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c del /S/Q C:\ProgramData\n3pn3b.zip
                3⤵
                  PID:2832
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 > nul
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2896
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 1
                    4⤵
                    • Runs ping.exe
                    PID:2828
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /TN VKDJ /SC ONLOGON /TR "C:\ProgramData\VkontakteDJ\VKontakteDJ.exe /H" /F /DELAY 0001:00 /RL HIGHEST
                  3⤵
                  • Creates scheduled task(s)
                  PID:1068

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\VkontakteDJ\VKontakteDJ.exe

              Filesize

              6.6MB

              MD5

              8909bd7fe908835145a9a0a749e1d110

              SHA1

              4b5ccdf348b9417073d0ceb3c33793b34fd3594d

              SHA256

              87f4f79473aaa8538814f7c5dbeadc938e491d736a3d11cba747cb1fc91dc7b4

              SHA512

              686dee7ef69c4bb1042c4056ddef3573ef0f1a1dd8af6695b128a4e4964cd2a88f83dcb1029d12b230f07e363603090cf5e113711bef39fe7da9ca456fb1bfd1

            • C:\ProgramData\VkontakteDJ\uninstall.exe

              Filesize

              490KB

              MD5

              e127107063431e8186811bac98ad0b6e

              SHA1

              27a508f87621792f102ed1d97e7689801132c13f

              SHA256

              c04672f2cdcba81fb8a6d9a0e47b3f28605e3b020c8dc37657f932c7d981dad9

              SHA512

              c88edce031d5d73a4f443dc31e2d204f650f876ad2fa517d3e47581fa48cdc93afbb4941bdc6f0b44060d209d59406bd855feadf0b18de30f27c3d61580b0661

            • C:\ProgramData\n3pn3b.zip

              Filesize

              4.4MB

              MD5

              a8d9303da2f0e4fda184aa53971ced81

              SHA1

              4c324e086b8a18e7d8ff18097acfaaa8522fedc7

              SHA256

              049e37f3d4ac9980a21a3b0833bc5a30183255df0cff0162a22b4206f959b707

              SHA512

              52627edd2ca46a4edf9231e001ce09d07ff9bba698da93a9c80de4be186bd479b036763cc59992a40f23467901993b6f4804a7231d730b4e007f2ca14bb937c5

            • C:\ProgramData\ppqvcxqjwx.js

              Filesize

              4KB

              MD5

              32ebed61c8f61c18b2383cb9511588a6

              SHA1

              1ea5052c738780000cbf9f6409069c289573f4ab

              SHA256

              a861e6d41cb838f1d90503b1d7858b26c81f43ef8beb5584a23345505dc82862

              SHA512

              050018c531aefaf66b937011d10519d9b7176e66d03f15f1d053be36b8560f18be01fb0a307452c592c193cfb6e81cbea90707007cd32522f9d39a0c07f64c3d

            • C:\ProgramData\tajm8\7za.exe

              Filesize

              722KB

              MD5

              43141e85e7c36e31b52b22ab94d5e574

              SHA1

              cfd7079a9b268d84b856dc668edbb9ab9ef35312

              SHA256

              ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d

              SHA512

              9119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc

            • memory/2108-0-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2108-33-0x0000000000400000-0x0000000000D31000-memory.dmp

              Filesize

              9.2MB

            • memory/2108-35-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB