Malware Analysis Report

2024-09-11 13:00

Sample ID 240613-rlmheswgkq
Target a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118
SHA256 2a32ff30ecc8d58809a5a14bbef7e12a9656b5a4a8eda1dbdb1c9fe44076206c
Tags
evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2a32ff30ecc8d58809a5a14bbef7e12a9656b5a4a8eda1dbdb1c9fe44076206c

Threat Level: Known bad

The file a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

evasion persistence trojan

Modifies visiblity of hidden/system files in Explorer

Adds policy Run key to start application

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Checks whether UAC is enabled

Adds Run key to start application

Drops file in System32 directory

AutoIT Executable

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 14:16

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 14:16

Reported

2024-06-13 14:19

Platform

win7-20240419-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\csrcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\csrcs = "C:\\Windows\\system32\\csrcs.exe" C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\csrcs.exe C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\csrcs.exe C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe"

C:\Windows\SysWOW64\csrcs.exe

"C:\Windows\System32\csrcs.exe"

Network

N/A

Files

memory/2236-0-0x0000000000400000-0x00000000004AB000-memory.dmp

C:\Windows\SysWOW64\csrcs.exe

MD5 a5f9d631a761520fbfc5dd3fbd0455a8
SHA1 052862f59ead4541d91c35f754300f52fd6e532d
SHA256 2a32ff30ecc8d58809a5a14bbef7e12a9656b5a4a8eda1dbdb1c9fe44076206c
SHA512 8ff5769c644242fdec1ba3f9eb2085638855d44cc8458ec8ad6a66d6d688ccb1160372ad17f10f111a1771ba3d29d8339f99b1d77190251aca8762b29dc23972

C:\Users\Admin\AppData\Local\Temp\ikprbzt

MD5 95d4df0948fde610ac0eb1f16738570f
SHA1 b48bdd0cc964014399f8795619b0ee5460a0f13a
SHA256 c73f1904f2cc337b38c4f22c4f5a0a26c007abc06572ac41a030896709cbd455
SHA512 063cc55c28244a12680ac5c24528f9eb984fdf84711ce5da59cbff8bea41daedb33cda4c0823c01a37bca39bdc27d82b6b7fa89ca25e857ec133b8fb1303a91e

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 14:16

Reported

2024-06-13 14:19

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\csrcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\csrcs = "C:\\Windows\\system32\\csrcs.exe" C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\csrcs.exe C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\csrcs.exe C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a5f9d631a761520fbfc5dd3fbd0455a8_JaffaCakes118.exe"

C:\Windows\SysWOW64\csrcs.exe

"C:\Windows\System32\csrcs.exe"

Network

Files

memory/3612-0-0x0000000000400000-0x00000000004AB000-memory.dmp

C:\Windows\SysWOW64\csrcs.exe

MD5 a5f9d631a761520fbfc5dd3fbd0455a8
SHA1 052862f59ead4541d91c35f754300f52fd6e532d
SHA256 2a32ff30ecc8d58809a5a14bbef7e12a9656b5a4a8eda1dbdb1c9fe44076206c
SHA512 8ff5769c644242fdec1ba3f9eb2085638855d44cc8458ec8ad6a66d6d688ccb1160372ad17f10f111a1771ba3d29d8339f99b1d77190251aca8762b29dc23972

C:\Users\Admin\AppData\Local\Temp\puxymbd

MD5 95d4df0948fde610ac0eb1f16738570f
SHA1 b48bdd0cc964014399f8795619b0ee5460a0f13a
SHA256 c73f1904f2cc337b38c4f22c4f5a0a26c007abc06572ac41a030896709cbd455
SHA512 063cc55c28244a12680ac5c24528f9eb984fdf84711ce5da59cbff8bea41daedb33cda4c0823c01a37bca39bdc27d82b6b7fa89ca25e857ec133b8fb1303a91e