Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 13:42

General

  • Target

    1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    1a5709a9fa14ec04f92422407f5f246e

  • SHA1

    fe7e13edfdd092a11f21489de845eb4f6c1ac0b5

  • SHA256

    1c3669d375ddc4dbb85d8c98959ccebc65173009779b19ce8256e6d971baebe7

  • SHA512

    5c599af9790d5567576dce554dc77004d7d2ac4297318224e15062745c83382d7d15f3d7c90a7e642cc9f56d8bae1fa497bab91c9af059ba76ad8fb81762867f

  • SSDEEP

    3072:AQIURTXJwVp5lL8RDRBXUlSdW9cpK4vwbxrG:Asml45PXUlSdWOpfWxrG

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C at 19:25 /every:M,T,W,Th,F,Sa,Su ""C:\windows\cdi.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\at.exe
        at 19:25 /every:M,T,W,Th,F,Sa,Su ""C:\windows\cdi.exe""
        3⤵
          PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C at 19:30 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dss.exe""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\at.exe
          at 19:30 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dss.exe""
          3⤵
            PID:2564
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C at 19:35 /every:M,T,W,Th,F,Sa,Su ""c:\windows\bch.exe""
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Windows\SysWOW64\at.exe
            at 19:35 /every:M,T,W,Th,F,Sa,Su ""c:\windows\bch.exe""
            3⤵
              PID:2720
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C at 19:40 /every:M,T,W,Th,F,Sa,Su ""c:\windows\hti.exe""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Windows\SysWOW64\at.exe
              at 19:40 /every:M,T,W,Th,F,Sa,Su ""c:\windows\hti.exe""
              3⤵
                PID:2552
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /C at 19:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\xtr.exe""
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2460
              • C:\Windows\SysWOW64\at.exe
                at 19:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\xtr.exe""
                3⤵
                  PID:2560

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              70KB

              MD5

              49aebf8cbd62d92ac215b2923fb1b9f5

              SHA1

              1723be06719828dda65ad804298d0431f6aff976

              SHA256

              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

              SHA512

              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

            • C:\Users\Admin\AppData\Local\Temp\Tar31B5.tmp

              Filesize

              181KB

              MD5

              4ea6026cf93ec6338144661bf1202cd1

              SHA1

              a1dec9044f750ad887935a01430bf49322fbdcb7

              SHA256

              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

              SHA512

              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

            • C:\Windows\hti.exe

              Filesize

              69KB

              MD5

              b7603c02e4711a0c2ba60165a07913f7

              SHA1

              b604896b3843ae812bac4dd800875d55b710b004

              SHA256

              cc3fb2dc03a5bdc7d5019645c9087f437547b16f877503022c65e5b069ac4276

              SHA512

              4f4127abb5efcad3a26998206bc062a0d9e591d16ae15bb5e6a2123aadc857e007fb237f64e3d4312e474491c20610cb58ec199f84bd0b8ccb0b7025da9d15be

            • \Users\Admin\AppData\Local\Temp\nsi236A.tmp\inetc.dll

              Filesize

              20KB

              MD5

              f02155fa3e59a8fc48a74a236b2bb42e

              SHA1

              6d76ee8f86fb29f3352c9546250d940f1a476fb8

              SHA256

              096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

              SHA512

              8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

            • \Users\Admin\AppData\Local\Temp\nsi236A.tmp\nsExec.dll

              Filesize

              6KB

              MD5

              acc2b699edfea5bf5aae45aba3a41e96

              SHA1

              d2accf4d494e43ceb2cff69abe4dd17147d29cc2

              SHA256

              168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

              SHA512

              e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe