Analysis

  • max time kernel
    148s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 08:46

General

  • Target

    1980712458a4b2b97eba5f0cfdbca6ab_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    1980712458a4b2b97eba5f0cfdbca6ab

  • SHA1

    8912771a25ba4e073b0b774a4d7420ef886089fe

  • SHA256

    b38dc61a16db2a727f5bce5610614bc986d2920cc170d565a040805373db9b66

  • SHA512

    c87a3fd4a94485a69906803ac5a7d264958e512e15b08fc5964cf42b3a0e4762135d71b0d093609baf977e3ba242143453a8e27d558143760cf97bb60a8530c7

  • SSDEEP

    49152:1AJYJOsBshId2l9SaxlK/HrY2oR2GveCQL+iRHy:GJYJrKh2vHrVoRDv+L+iRS

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 11 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1980712458a4b2b97eba5f0cfdbca6ab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1980712458a4b2b97eba5f0cfdbca6ab_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\stop.js"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\foto.exe
        "C:\Users\Admin\AppData\Local\Temp\foto.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\1600.tmp\foto.bat" "
          4⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\SysWOW64\sc.exe
            sc delete SharedAccess
            5⤵
            • Launches sc.exe
            PID:2480
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +s +r "C:\Windows\system32\rfusclient.exe"
            5⤵
            • Drops file in System32 directory
            • Views/modifies file attributes
            PID:2508
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +s +r "C:\Windows\system32\rutserv.exe"
            5⤵
            • Drops file in System32 directory
            • Views/modifies file attributes
            PID:1432
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s hak.reg
            5⤵
            • Runs .reg file with regedit
            PID:828
          • C:\Windows\SysWOW64\rutserv.exe
            "C:\Windows\system32\rutserv.exe" /server /silentinstall
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Windows\SysWOW64\rutserv.exe
            "C:\Windows\system32\rutserv.exe" /server /start
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2288
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
      2⤵
      • Deletes itself
      PID:2744
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2908
  • C:\Windows\SysWOW64\rutserv.exe
    C:\Windows\SysWOW64\rutserv.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\SysWOW64\rfusclient.exe
      C:\Windows\SysWOW64\rfusclient.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Windows\SysWOW64\rfusclient.exe
        C:\Windows\SysWOW64\rfusclient.exe /tray
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1160
    • C:\Windows\SysWOW64\rfusclient.exe
      C:\Windows\SysWOW64\rfusclient.exe /tray
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\1.jpg

    Filesize

    16KB

    MD5

    42aeb1c40ec4668176a1a770cff134b6

    SHA1

    21064102b097093a73d1702f4f68b8c9c163948f

    SHA256

    a014e91ebd5b3e06a988cd06b7ca476a9023b2adf45d519a246a995e4a088f91

    SHA512

    c409964163fcf5064da9b6f3932c99ddc10e9d3268ae61194be6f5ec6d28bf101fa38b9788d1a9a827572065986e664d17adaf8828bf034706d4d55203d0c006

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\HookDrv.dll

    Filesize

    144KB

    MD5

    513066a38057079e232f5f99baef2b94

    SHA1

    a6da9e87415b8918447ec361ba98703d12b4ee76

    SHA256

    02dbea75e8dbcdfc12c6b92a6c08efad83d4ca742ed7aee393ab26cab0c58f9e

    SHA512

    83a074bef57f78ede2488dd586b963b92837e17eea77ebd1464f3da06954ae8ca07f040089af0c257e2836611ae39424574bd365aea4a6318a2707e031cd31a5

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\foto.bat

    Filesize

    608B

    MD5

    cf22baa288ca6610573d870d7f68889d

    SHA1

    8b438dc561765c884e8fb6fffdc81e861fd54b40

    SHA256

    733b92c89a2f9b74d2d8b738faeb472bcbfc1668c48be4d1c35c9d54ffc55d58

    SHA512

    be9ee8f097c9d43dd5b74971171a12e1ba1a529bb7fe380c9d48d2840c34591839ad7966ddce4ef7e22ef28b270acdb7854dc2861878ac7e29d7d013901cc7d8

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\hak.reg

    Filesize

    14KB

    MD5

    d6e314a2bd764424fc9eadb6287626c9

    SHA1

    0e4f5b516026149add33a466257cb8925b6aa857

    SHA256

    6f4845a5e709853cc2f5a5821d44ca6f74919026e7f3f41178b19daf0bdb780a

    SHA512

    ba79f21733439d14f41a9fc78ff02be4452c2b3cd217267135b055ea3b98068e4cc47cebd74fb7a5713ce91a247546fecb864ce2585b405a1f9422dc009c49be

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\rfusclient.exe

    Filesize

    2.8MB

    MD5

    f449d06b49e258b04bba5eaeab748aa2

    SHA1

    6de5e6fba23c681c949240f5435fba33e3034d27

    SHA256

    c18c2bbafdab4e5974ede842bd4bd854deff9135356681ff84ba2f1c047e7c7a

    SHA512

    b6441ae86e4f65e9d85a75312cc27e0bcc2992c89691be239e787ca28e69409a074e6ae0d1d45f518743fa60c664b85d120786dd57b6faf25bad6cb0b1a90e48

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\rutserv.exe

    Filesize

    3.2MB

    MD5

    11fe69e28c7fc7e975b6485520174de8

    SHA1

    b2e6f974adcec6b18e54e27f83805d8ce3560dea

    SHA256

    2d3c994449f1b13d55e22bbbae4bf36269f21a726c681271ecffc9fcab8f0425

    SHA512

    25a05981afc787d48bd78a2e6a5df28040bb485fc18cccde68c9337597cabff5c70258bba7cbed802075800c9918664cadae775346887544ca7c9a3829f18aa9

  • C:\Users\Admin\AppData\Local\Temp\1600.tmp\rversionlib.dll

    Filesize

    310KB

    MD5

    16ae96fc0134c9163a404aca5c8115da

    SHA1

    a4818324c392a53166d42c879cdb70f0efea46af

    SHA256

    16e801ff476b93016930ec879181661dc7d098424d4e383935b186e5eb5c5c6d

    SHA512

    98eeb9307ad75459364cd67f341be46578d15907d657fc5c49d37a04e1fc71e6ed23d46865fca085b82027eeeebcb546861a43f6cbba537b63075224e9fb0c13

  • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

    Filesize

    264B

    MD5

    13430c0f8360456f801f9bc372e7624c

    SHA1

    8665531e12a3de10e21f3f450ecdbcc9f1b5f124

    SHA256

    bab6df9bb282727cd467627d63a05202808951fe9c205e2f8d0849e262d9fa67

    SHA512

    f6dc4e2f776b29a014de4eebc02fbc9de1eb9a96f52e799cd3660afa91ae66b60dcb0155a355a266dbe87097611bd8b624b4ff5b6308bf9bda1e189b0af627ce

  • C:\Users\Admin\AppData\Local\Temp\foto.exe

    Filesize

    1.6MB

    MD5

    3566e183de87939f2d75c4c9ae208465

    SHA1

    44ac8d4a7206801522c80f7a6ee6c282a0359b0f

    SHA256

    4af6351a3440aa4ee3c5ad4d94fec406d0b8f9d11e06449562349ed4424c7678

    SHA512

    a49639505c5701d4f3599e0908dc55c4b6350c5ed3e2ab03af56aeae8c1623b373cadfc6ed6da4f2f062b9a7c9ab4207bcfa86e82cdf1646f2755cd4c297a007

  • C:\Users\Admin\AppData\Local\Temp\stop.js

    Filesize

    212B

    MD5

    a3d0a0d32ce3c60f0b205d882435f8ac

    SHA1

    b28bad3ef81216f14fd7a262a3ebc2258fcc7d9d

    SHA256

    e7455abc7bdc2d705b007e9b0332e7c8d3793492f33324c7dd10b0a0513c2e3f

    SHA512

    ea53f374b3291ec6ede586250ba787567c37c5f44014d347ac02612071c69f51e8499f2b26e6a7e957f5ca1749495f5c7398f479dd0dbe9bd29e95fa15843af9

  • memory/1160-153-0x0000000000400000-0x0000000000757000-memory.dmp

    Filesize

    3.3MB

  • memory/1160-154-0x0000000000230000-0x0000000000288000-memory.dmp

    Filesize

    352KB

  • memory/1708-10-0x00000000042E0000-0x0000000004967000-memory.dmp

    Filesize

    6.5MB

  • memory/2056-126-0x00000000002B0000-0x0000000000308000-memory.dmp

    Filesize

    352KB

  • memory/2056-124-0x00000000002B0000-0x0000000000308000-memory.dmp

    Filesize

    352KB

  • memory/2056-125-0x0000000000400000-0x00000000007C2000-memory.dmp

    Filesize

    3.8MB

  • memory/2256-183-0x0000000000400000-0x0000000000757000-memory.dmp

    Filesize

    3.3MB

  • memory/2256-160-0x0000000000230000-0x0000000000288000-memory.dmp

    Filesize

    352KB

  • memory/2256-159-0x0000000000400000-0x0000000000757000-memory.dmp

    Filesize

    3.3MB

  • memory/2288-130-0x0000000000230000-0x0000000000288000-memory.dmp

    Filesize

    352KB

  • memory/2288-144-0x0000000000230000-0x0000000000288000-memory.dmp

    Filesize

    352KB

  • memory/2288-143-0x0000000000400000-0x00000000007C2000-memory.dmp

    Filesize

    3.8MB

  • memory/2312-142-0x00000000002C0000-0x0000000000318000-memory.dmp

    Filesize

    352KB

  • memory/2312-158-0x00000000002C0000-0x0000000000318000-memory.dmp

    Filesize

    352KB

  • memory/2312-176-0x00000000002C0000-0x0000000000318000-memory.dmp

    Filesize

    352KB

  • memory/2312-157-0x0000000000400000-0x0000000000757000-memory.dmp

    Filesize

    3.3MB

  • memory/2492-100-0x0000000000660000-0x0000000000662000-memory.dmp

    Filesize

    8KB

  • memory/2548-156-0x0000000000230000-0x0000000000288000-memory.dmp

    Filesize

    352KB

  • memory/2548-155-0x0000000000400000-0x00000000007C2000-memory.dmp

    Filesize

    3.8MB

  • memory/2548-161-0x0000000000400000-0x00000000007C2000-memory.dmp

    Filesize

    3.8MB

  • memory/2548-167-0x0000000000400000-0x00000000007C2000-memory.dmp

    Filesize

    3.8MB

  • memory/2548-197-0x0000000000400000-0x00000000007C2000-memory.dmp

    Filesize

    3.8MB

  • memory/2588-146-0x0000000000400000-0x0000000000A87000-memory.dmp

    Filesize

    6.5MB

  • memory/2588-11-0x0000000000400000-0x0000000000A87000-memory.dmp

    Filesize

    6.5MB

  • memory/2908-101-0x0000000000100000-0x0000000000102000-memory.dmp

    Filesize

    8KB