Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 17:59

General

  • Target

    2d4cc04a7232a4439bdae3b9e4a08668_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    2d4cc04a7232a4439bdae3b9e4a08668

  • SHA1

    befb99f76c30b01d63f0d730db4fb8fe4921f43b

  • SHA256

    e745b2ca48266714236b603f72640e65cd1d77aa7d3f01f9dec9e2635c3fff3f

  • SHA512

    a5ac83aa1d5f3927e01729dea9b4b982f1a456da642b7707b4568ca0ecc07e72b4e577eb3058afaa9d3a90c0b6ccbaac8f32bd060a18d1938330d55682f4a091

  • SSDEEP

    1536:YzeoGcdsDlGr513R7b5T3kK2ztGZKVuMh5o4GYcb12DdGBLznouy8Ec:YqopsM3Rn5gK2zsZKVuu7cb12DdGRLog

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d4cc04a7232a4439bdae3b9e4a08668_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d4cc04a7232a4439bdae3b9e4a08668_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\2d4cc04a7232a4439bdae3b9e4a08668_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\2d4cc04a7232a4439bdae3b9e4a08668_JaffaCakes118.exe
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\csrss.exe" CityScape Enable
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:1560
      • C:\Users\Admin\AppData\Roaming\csrss.exe
        /d C:\Users\Admin\AppData\Local\Temp\2d4cc04a7232a4439bdae3b9e4a08668_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Users\Admin\AppData\Roaming\csrss.exe
          C:\Users\Admin\AppData\Roaming\csrss.exe
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:2320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          55cccdf8e09ed7e6f54e5f4509170c69

          SHA1

          d8b6697dfdb936f7725af2013aa0506996a78442

          SHA256

          a42a9d1de3355b81e9a641e33d4dc70bae7e516049c431ed7ed13ec9c2e2bc8b

          SHA512

          cc22ed6d09c207aaa5571310b7b1973b55152416715b02fc8c3885e7391b69e823ef49d6255847a2d091c8ec9a9d8ad68b2e2e3a6154ce595e7b149d02c2d87b

        • C:\Users\Admin\AppData\Local\Temp\Cab2CCD.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar2D9B.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Roaming\csrss.exe

          Filesize

          81KB

          MD5

          42b83083a3828f27ec3ab6131bca0e1e

          SHA1

          58f7bc0c6aeec3152f840f149ad043d7c38f60de

          SHA256

          f5357c06c98c30b261e05f02e843dc789231c1c77e897f4c09c1375c9b85967d

          SHA512

          a145a12b01a7b749ddcc290153a2b876dcadead93bcd5156dc480a3ede716ddd70ab33f43b0567a6705cf330f8bf90a7328cba4272f1a90a4433aaa8abbb83a3

        • memory/2320-183-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-184-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-185-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-182-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-181-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-180-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-179-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-186-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-187-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2320-188-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-6-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-8-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-155-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-13-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-151-0x0000000003EA0000-0x0000000003F58000-memory.dmp

          Filesize

          736KB

        • memory/2744-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2744-21-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-4-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-16-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2744-14-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2960-20-0x00000000034B0000-0x0000000003568000-memory.dmp

          Filesize

          736KB

        • memory/2960-0-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/2960-18-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/2960-159-0x00000000034B0000-0x0000000003568000-memory.dmp

          Filesize

          736KB

        • memory/2960-3-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/2996-178-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/2996-158-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/2996-157-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB