Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 14:23

General

  • Target

    06ca6d90c80d76ef20aab6bc99167779_JaffaCakes118.exe

  • Size

    685KB

  • MD5

    06ca6d90c80d76ef20aab6bc99167779

  • SHA1

    a55aa39be0ade1b0d8fd3f9954e7cb5ef7545cf0

  • SHA256

    5f6dfef989b9ac4da5ccb5fcb8bc07ee3d6b86188e6d20d5d349d42191e15ab0

  • SHA512

    00b6d256687ca02ef0d97317cd3f4712c87a9e777ffcaea9d06ece629513988dbed7a6a69d0500885300790a5824abe3e80c9f858a4b2271810fd1cfe79e2051

  • SSDEEP

    12288:qW5n9Ol1DiaEtPBw4UsKK7A+y5gmyF2xP2W21WYdpPz8ZtZVyLmg/TsNQ1oP:qonU+ax4e2myF2x+W21rdpP4ZtZELT8f

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ca6d90c80d76ef20aab6bc99167779_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06ca6d90c80d76ef20aab6bc99167779_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\windows\SVCHOST.EXE
      "C:\windows\SVCHOST.EXE"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2788
    • C:\windows\Pinnacle.exe
      "C:\windows\Pinnacle.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Pinnacle.exe

    Filesize

    261KB

    MD5

    b2755b1b19afb6f091b95a04fcfc7e32

    SHA1

    13bb01e2c504b1d76ad20931c33bf1361b8a07e8

    SHA256

    8ec3c7cc0cade861b181c9ebe19b970ee5bdad92cc50d1fc5de8bcc1b3b831ac

    SHA512

    0ee56aa01f3861179aed1790b2ac619c3b0e03ceda4e188fdced6b49c5f9e7d3bbc510f54e8e7b69dcaee2f92594d9e536982e4e5bd4eda5763941651661669e

  • C:\Windows\SVCHOST.EXE

    Filesize

    500KB

    MD5

    2c3a3dfc019e42a6dc14ff2c2de71cd6

    SHA1

    c5013a9e0253928d75176a238bd21ff311364e9e

    SHA256

    d4e7e8e9f0d90d90029c83cdfbe5810bb1b20605d50cd57ef008f63dbe44c858

    SHA512

    f830f3c4fe0c8bf507f541b7c82eba93370c81fcbbaf89e54492873086838e20ac3a4d55957263138f4e76e7cb059ea55ca49dd0e672a4d237b0aa37e1e7abf8

  • \??\c:\windows\svchost.inf

    Filesize

    3B

    MD5

    a5ea0ad9260b1550a14cc58d2c39b03d

    SHA1

    f0aedf295071ed34ab8c6a7692223d22b6a19841

    SHA256

    f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04

    SHA512

    7c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74

  • memory/2124-4-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/2124-2-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/2124-7-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/2124-5-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/2124-0-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/2124-8-0x0000000001F30000-0x0000000001F32000-memory.dmp

    Filesize

    8KB

  • memory/2124-9-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

    Filesize

    4KB

  • memory/2124-16-0x0000000002000000-0x0000000002001000-memory.dmp

    Filesize

    4KB

  • memory/2124-15-0x0000000002010000-0x0000000002011000-memory.dmp

    Filesize

    4KB

  • memory/2124-14-0x0000000001F80000-0x0000000001F81000-memory.dmp

    Filesize

    4KB

  • memory/2124-13-0x0000000001F90000-0x0000000001F91000-memory.dmp

    Filesize

    4KB

  • memory/2124-3-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/2124-27-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/2124-6-0x0000000001F30000-0x0000000001F31000-memory.dmp

    Filesize

    4KB

  • memory/2124-33-0x0000000000510000-0x0000000000545000-memory.dmp

    Filesize

    212KB

  • memory/2124-1-0x0000000000510000-0x0000000000545000-memory.dmp

    Filesize

    212KB

  • memory/2124-28-0x00000000032F0000-0x0000000003394000-memory.dmp

    Filesize

    656KB

  • memory/2704-29-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2704-36-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2788-30-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2788-35-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2788-39-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2788-40-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2788-46-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2788-48-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2788-50-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2788-58-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2788-60-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB