Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 18:04

General

  • Target

    16f902491090535d69774895fde63bf4_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    16f902491090535d69774895fde63bf4

  • SHA1

    f7273cac1b3ed08cc15275a5eb3a6771daa6b91b

  • SHA256

    76869418b743d0c1c2ff4241f62f2ae0c63af1233dfb577eb71baad3be896f96

  • SHA512

    1a32ec1437b121956a0a366ffa93511b42c17a59b032333482fa5eea5b462805772f02014a808a95f7dca48e050d23cd5c4305a67c37624c4441acafe12ac691

  • SSDEEP

    1536:ylUNYw+Awk9/0WmGOq4OroRm2oO0jYlcwrLpdUGvd:yxAws/ldrom9cDr9OG

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Drivers directory 4 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 26 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 48 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16f902491090535d69774895fde63bf4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\16f902491090535d69774895fde63bf4_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in Drivers directory
    • Event Triggered Execution: Image File Execution Options Injection
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\net.exe
      net stop cryptsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop cryptsvc
        3⤵
          PID:2380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\drivers\IsDrv120.sys

      Filesize

      4B

      MD5

      e89854dfc541758037d0d9898aac114b

      SHA1

      352c5f759fbd5da2383af80f897e0012db3d45ed

      SHA256

      f015c4c4e29b4b0d404d2b8dd98be87d41bf486b711aeba13379eee5095ecbaf

      SHA512

      b555df0a92d57756da8887a945d1fc668b494973fe3011828e43dcf9b381a4197eaf9121010716173fea331cf3f2fea9cf85e4fb2dc550fcb32cb61448be7465

    • C:\autorun.inf

      Filesize

      119B

      MD5

      8815ca284498e1a366afbb10c60e95e9

      SHA1

      fb02189ab180d7d72567cf31c8ee3ed2a85dbed1

      SHA256

      0ef510e196e2d7432dff036164ffd3845fbb0f8cd59511a93b032e7b42c326be

      SHA512

      d683e4954f450296472ebfbf1fd3704e9fb1db65bf99f61d58c81dfcc5414a44bfe31198c29167c0c171bcc0e77b89e393039bb61b17b7c9d5a9803bcde5361d

    • C:\info.exe

      Filesize

      124KB

      MD5

      16f902491090535d69774895fde63bf4

      SHA1

      f7273cac1b3ed08cc15275a5eb3a6771daa6b91b

      SHA256

      76869418b743d0c1c2ff4241f62f2ae0c63af1233dfb577eb71baad3be896f96

      SHA512

      1a32ec1437b121956a0a366ffa93511b42c17a59b032333482fa5eea5b462805772f02014a808a95f7dca48e050d23cd5c4305a67c37624c4441acafe12ac691

    • memory/2116-0-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2116-359-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB