Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 00:26

General

  • Target

    9c6f32c031950cfd5d9b97c838dd7905_JaffaCakes118.msi

  • Size

    2.7MB

  • MD5

    9c6f32c031950cfd5d9b97c838dd7905

  • SHA1

    ee51a10f07a379ca47a909b314aca5f70dc832bd

  • SHA256

    151fc073b2f04971f8a0337d81aed266e3322f5282555f46e96abdbab0f0dace

  • SHA512

    dffa818ae32b7039da4490247e0284442e84486c7b7ed27750d6eb70fe55d5e681a32d2687148238e57c04962a8fcee409d7383c02c5b1e3c4681b6d418c5f86

  • SSDEEP

    49152:FMQYUbyuoja3HnY6rTpbp3J2YZ05HltMgsmdRUXFoQy2:FQUbJOa34apbp3J2LFCHoD

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9c6f32c031950cfd5d9b97c838dd7905_JaffaCakes118.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2932
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Program Files (x86)\PermissionResearch\prmrsr.exe
      "C:\Program Files (x86)\PermissionResearch\prmrsr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram program = "c:\program files (x86)\permissionresearch\prmrsr.exe" name = prmrsr.exe mode = ENABLE scope = ALL
        3⤵
        • Modifies Windows Firewall
        PID:2092
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2956
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004D8" "0000000000000580"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f764990.rbs

    Filesize

    1KB

    MD5

    e9db0bc709b22adbb260b606b109a77d

    SHA1

    9ac58bfe57252353147f757142200b1c7336a57c

    SHA256

    e517e570dd390f84325cc03391f17a3b66574fe56218af7dc57da05d5c4fe32f

    SHA512

    6dcb84604f991bb7cec39147587519948b8dd4a0d07b75a53b17422e268af3b857c63d5c6fba22b48de6abd66a5fc2dc51756ceec8a35d974a370bf7519842df

  • C:\Program Files (x86)\PermissionResearch\prmrsr.exe

    Filesize

    3.3MB

    MD5

    44b6124384165c384b4ffcc4d82b508c

    SHA1

    7607b1f0a31d5607913674482b1a3f8911e5ce5c

    SHA256

    e3327646ad08dae97b3dcb893de21c5360ae6c41947fb5c620347fe71e133674

    SHA512

    ccdb0f0342f63f54a199722685d754743068550a3354628c6147e5c3d076e7eb710bd4657eebae3b13e2ceac8c389176b746aab447ddd507d7a545e5647c85c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_A0DCA7B6BC1DA925FB1B7B9C5E4D987D

    Filesize

    1KB

    MD5

    8d788374b7e6b27f09a5d028651ff34d

    SHA1

    ec1fd26e28a48a2f2f4d2b9825214b7b56d3aa79

    SHA256

    94d1c6ffe8f2a92d4247549b7a8da00e1d00137db26c1cbcb643477e13259b15

    SHA512

    29e11de7e3f2eee460079de186bdbe0729e42bb677f4ddeb72df054491511f1f69e39f5a24dfb96660a1d2080b6f844572cd7f93ddb9bd51f325d43e1df1838f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_C460FCB64C3742B670FBE11BAB276CF3

    Filesize

    5B

    MD5

    4842e206e4cfff2954901467ad54169e

    SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

    SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

    SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    cbed24fd2b55aea95367efca5ee889de

    SHA1

    946f48b5c344fd57113845cd483fed5fb9fa3e54

    SHA256

    1dc8a0fcbe260b77adfe5ad9aaac543239b2a0d9f4e1f3c2657beee4376ffee4

    SHA512

    c504a11ea576f8ce14de26a0617e22e71e14db0f1dadefc187ce94e4a35a83743c743824e3629899c262aae4772bb86a0ee5bb643db20645483f0c376215ec6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B8944BA8AD0EFDF0E01A43EF62BECD0_A0DCA7B6BC1DA925FB1B7B9C5E4D987D

    Filesize

    494B

    MD5

    55b9e5b9f66bcbbe0a6e038c6db1ea4f

    SHA1

    f90cc011a13663a99ecf3c0ba5a0f4e66bd1a459

    SHA256

    f0609e2de43357148e75afde1104e2556ed76b6b1ef4d6ab41b1099ce1ca845b

    SHA512

    85a9745edb23a94cffcebaf019c5ab999c179a55b47b90b85c0d82d88e72bda032a79b9102c01513a76a36893e3be91e7edb60ae103cc58761ad195ef5558ce4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B8944BA8AD0EFDF0E01A43EF62BECD0_C460FCB64C3742B670FBE11BAB276CF3

    Filesize

    416B

    MD5

    917cec905194902af05e355c6062801d

    SHA1

    eb2560a77c282e40bbf9915d7a064e6b0b445a9e

    SHA256

    28ca8e146124043c852a4974ea88b9a4fadafafd6486f639731f4de286478fe1

    SHA512

    4922545fb881f65dcb8f3a7a156e0acde3bb7c56b92320e622e24ebb6cadb6b0fe60518dda74c201a18ba900ed2afde2bd21a4fa761311b70ea44db8f58fc8a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    6aab29fbc4fcd3ee60a366de8862c814

    SHA1

    d1dff83181a466a5fa9e901e82ebf97eaa9fe342

    SHA256

    f54c742d8726c0ca7c229f7b6fa3621b004a15b67ed3b57a78cedd1ef5053103

    SHA512

    b79332385a4cb633c7dc08a0c720c26ef7f94cab12ea9687a93285202b7ea8ac82a958725da23a875370facb0638ac03c6a99b56240119c5667e71ace934c97a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    e6c2281f52a47a3a16432cdd0c2da878

    SHA1

    17eb4041674337494cd5067e44295caafd438bee

    SHA256

    4a9b26fe897ad5d6c6e6041f810f1845144c940a111e0f8ecf588ec686f6efdb

    SHA512

    d4ceec9a5fe2f14fd6020af822807f79e8cd39bbf1aa2856d9cb6b8c2d501b7f309d0a9c5fdc67911d7d20aa5d266b2fd18012ac1507f4e69fcb536362092a62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52c413b9998d5758fb94b8aab5ccbb18

    SHA1

    86caa183c540697bc6bc034d5dba9b84cbd48b2b

    SHA256

    ecbdc88a5bb9553f7df60dc375a8f304d04683736d19075b5a4b5ff92fe8dfc0

    SHA512

    6dd8abcdbaebda70aeb5d3fea9ce64c918583c79f7229cad2f5abfbcca8205f38d4327cbf0eb7e64b206c7910ce6a59587c9999852e8066ba55be3d8f7ab5e64

  • C:\Users\Admin\AppData\Local\Temp\Tar1B55.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b