Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 09:22

General

  • Target

    2bcd9a26dc2d01db6406970103494390_JaffaCakes118.exe

  • Size

    755KB

  • MD5

    2bcd9a26dc2d01db6406970103494390

  • SHA1

    37142aba3dc61e34691f3366039aaff8b32c17cc

  • SHA256

    205f351bd8239eebb61655a288c53bf537017d4662bdd0a2c0275d0fc89d77c6

  • SHA512

    1b80bc7b7720f1bd029d5d0f5b83c53afc93bef5d52f3de08b14c921db7fefe7d95d11a5f0d8dd8152a68da73d939ad0206d860925a10d09542552e2bdc4bbb1

  • SSDEEP

    6144:Rpqoa8aLgC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcAYnCZ:RpqgC/2OGAtkCP4cejGSOpRK3CnIim

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bcd9a26dc2d01db6406970103494390_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2bcd9a26dc2d01db6406970103494390_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT /delete /yes
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\at.exe
        AT /delete /yes
        3⤵
          PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Users\Admin\Desktop\system3_.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\SysWOW64\at.exe
          AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Users\Admin\Desktop\system3_.exe
          3⤵
            PID:3040
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\system volume information" /e /g "Admin":f
            3⤵
              PID:1012
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Windows\SysWOW64\cacls.exe
              cacls "C:\system volume information" /e /g "Admin":f
              3⤵
                PID:576

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Desktop\autorun.ini

            Filesize

            102B

            MD5

            948c74cd98911b420ff89dac13399bcb

            SHA1

            76dfc73518f003953923b1b4f2b973f4bb56a411

            SHA256

            94a1ac3d574425ec8a3cc01675e4d787373d2a190dddd4f8ba507c49ca3fd42a

            SHA512

            b31d82ede9d48e390a50a9dcf5c4c607c62638e8bc56f473250f9a56b7967d5de948abed69bbb2c35eb0112288faa5c438316b06ccbb36d289e93952b30e2ede

          • C:\Users\Admin\Desktop\system3_.exe

            Filesize

            755KB

            MD5

            2bcd9a26dc2d01db6406970103494390

            SHA1

            37142aba3dc61e34691f3366039aaff8b32c17cc

            SHA256

            205f351bd8239eebb61655a288c53bf537017d4662bdd0a2c0275d0fc89d77c6

            SHA512

            1b80bc7b7720f1bd029d5d0f5b83c53afc93bef5d52f3de08b14c921db7fefe7d95d11a5f0d8dd8152a68da73d939ad0206d860925a10d09542552e2bdc4bbb1

          • memory/2468-0-0x0000000000400000-0x00000000004D5000-memory.dmp

            Filesize

            852KB