Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 09:21

General

  • Target

    199ae7a8bc09f78bfaab752c586d9e44_JaffaCakes118.exe

  • Size

    556KB

  • MD5

    199ae7a8bc09f78bfaab752c586d9e44

  • SHA1

    3a73b40cfef0d82dd7d551f6c644322a9d240d90

  • SHA256

    988f493a8ba71eabcf982cd11b00c24d8117569da1e81a5650a814930a91d5e5

  • SHA512

    3fc34d04cceed059573b5cd65101c531cf0f1fbddeab5c7714721d46d9e3ac664a39d83a960849f39e11b2f62edacc3b95202c642bcd32e18e1da1e73e932ea2

  • SSDEEP

    12288:PxaVAh64U5lER+1YPj5Gw5hCcPtYhUm1fez87LG1TsLE1FfD:PxaVxr52CYP/CkYhU67a1TsLE19D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\199ae7a8bc09f78bfaab752c586d9e44_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\199ae7a8bc09f78bfaab752c586d9e44_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\6 5\bat.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\taskkill.exe
        C:\Windows\system32\taskkill.exe /im svchost.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2620
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKCU\software\microsoft\windows\currentversion\run /v adobeupdate /d "\"C:\Users\Admin\AppData\Roaming\6 5\l3.lnk\"" /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2912
    • C:\Users\Admin\AppData\Roaming\6 5\j.exe
      "C:\Users\Admin\AppData\Roaming\6 5\j.exe" "C:\Users\Admin\AppData\Roaming\6 5\svchost" -o http://eu.triplemining.com:8344 -u tundermacko_newbit -p 1234
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Roaming\6 5\svchost.exe
        "C:\Users\Admin\AppData\Roaming\6 5\svchost.exe" "-o" "http://eu.triplemining.com:8344" "-u" "tundermacko_newbit" "-p" "1234"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\6 5\bat.bat

          Filesize

          189B

          MD5

          bab17c16f9e3c661064c83df2d1b4658

          SHA1

          a7676d59b0bad23f6d9ac56c38c3c30c7c3539cf

          SHA256

          2acb3f7cbfccf56261ea600ae674cd191ef6c226d922a50536466e45915e9475

          SHA512

          8abc532820bd43494baa4d13c74751ab9e813a75f0f0ff1055ee044ad1837edd2430336f1c4a0a80f97c7150774f75300c17ed109b498fa12c4550bd483c36c1

        • C:\Users\Admin\AppData\Roaming\6 5\j.exe

          Filesize

          136KB

          MD5

          935809d393a2bf9f0e886a41ff5b98be

          SHA1

          1ed3fc1669115b309624480e88c924b7b67e73bb

          SHA256

          c92904610319843578ada35fb483d219b0d07da69179d57c7e1223cab078492c

          SHA512

          46bccaaba4b8b4cfa247f48b55998d13b37f714ac69f6b08a97b6b8075f61233545406bc9f8db7d2848f1831eeb506da650b72d7d3a2f624e51eccd5fc537bc5

        • C:\Users\Admin\AppData\Roaming\6 5\svchost.exe

          Filesize

          434KB

          MD5

          34ed4d5e131ad520074842f3a4562950

          SHA1

          639c23a2f56d4c6f48d6ae9f3dc856bbc98d13d3

          SHA256

          7c789c86b493cda5c10dc802720f8032f547c65c8191a234a2aaba8070520a8b

          SHA512

          cdaf85e029ac440f3a00b4059f27eaa1dedd8592b0b1dae3554b913bb08f59e01580e68d3fdc589bb2000b7257c445ea5216bc505b54380ce7811fb43ee4839a

        • \Users\Admin\AppData\Roaming\6 5\OpenCL.dll

          Filesize

          50KB

          MD5

          6c5bde40d18116e6c592506a51e014da

          SHA1

          2afcec48a0453c9e8b699b70da0b7b323882cc7d

          SHA256

          5e37f84046c38b34fd45a7c3f62c68984fb61ebc02d57f878f17a8d97750c6b6

          SHA512

          a5d41a6575c3b86e07a48422378106970640b1ea6e8ee0426a0c4e7d79320626e14bc3c984376f4890ad2b8e77d17497b6d3592190a7691d31a4f724647e8131

        • \Users\Admin\AppData\Roaming\6 5\libcurl-4.dll

          Filesize

          280KB

          MD5

          c8dd0d50f5b8676e8a166595f3f1b1d2

          SHA1

          222116789ac4a5dc3a14d4a480ca907d2151f5bd

          SHA256

          493d1df5e74c271ce437e2cfd13b5e9dea79d05e286815e8b8541c937fe6ba4c

          SHA512

          b60e50aaf118d32b57872ef7843526949b2bab6343995f68c11cce26af52ed03d25e475a3d9fd003cf7a6eeb90cd576bbed4e937db2d6ffb2ec5f2caf98e3a8c

        • \Users\Admin\AppData\Roaming\6 5\libusb-1.0.dll

          Filesize

          173KB

          MD5

          7f2523dec5fa92c70f3ab13765d799ff

          SHA1

          f94a6cc07fa8aa680e3776df30e5171ce884fd0e

          SHA256

          7ceb91390ac581b78be8a18a6eebf7f9124a2460c4f9849ee4c75ec303412062

          SHA512

          33190cab913efaa7903b1cf1c9525bc2688cc7f954289bd2776e0bf141e4a78fd4f34cf0242e4da8ef30c3c6816da7d22573f645caa3b26571b9bd900dd31a37

        • \Users\Admin\AppData\Roaming\6 5\pdcurses.dll

          Filesize

          85KB

          MD5

          1b364ec27b6f4f8879dabadb096a4f64

          SHA1

          1306650116ed181165d8cbc4098b07c0b08fcd09

          SHA256

          94995b0560d2ccda7951252397eb152b499454746b75d03479bbfa551def41e4

          SHA512

          bc7232055b0bd65c92197898b4eef3a6e92e6e8b55280a9f971d7bb147057800c9bc980dd9f10ec155ccf153679d55df3a3997ced04bf1d35d4e6376764e2dbc

        • \Users\Admin\AppData\Roaming\6 5\pthreadGC2.dll

          Filesize

          66KB

          MD5

          8bc13c002f91cff22a17f5a5191c1292

          SHA1

          113b3d47ce52fd13e0c8038257c3ae05f3a1a9ff

          SHA256

          97c1a2cabfe69b987732a1502dac6cce9c6e31f6f7e9142fc4bc8d92077f2da3

          SHA512

          e78a607c48e1ff1362aadf298f679f716e0f8ded48cd4b835fe688a9f8cdb4ce8b227c2b71b78826f10285302d414b64082bf500ef471f1342bd4bc7f87e8033

        • memory/316-95-0x000000006B600000-0x000000006B62F000-memory.dmp

          Filesize

          188KB

        • memory/316-94-0x0000000062480000-0x0000000062499000-memory.dmp

          Filesize

          100KB

        • memory/316-93-0x0000000062200000-0x000000006221C000-memory.dmp

          Filesize

          112KB

        • memory/316-92-0x0000000070800000-0x0000000070842000-memory.dmp

          Filesize

          264KB

        • memory/316-91-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/1244-80-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB