Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 23:45

General

  • Target

    36e257f1720a643387a3527dd727a021_JaffaCakes118.exe

  • Size

    82KB

  • MD5

    36e257f1720a643387a3527dd727a021

  • SHA1

    e8f62579371b07b87ced23ed7fa3057085b3f6f9

  • SHA256

    29a103e0c1ff76627ab5856fb98dc0f8d052839c8d6a051819527bf2fe721215

  • SHA512

    716324a2a982630975162459d4b32619e0154f6d55d6df95433926b1466aaf22adc9eec753734bbdecf48041588d726cf52bfd68021a06e6e4ad5f32d743b73e

  • SSDEEP

    1536:9ShMseNBOVzwnFixjoP7+y3v4SFQYPwo0X2pekLNcSFlupQBSvM:9ZJUVdOKG4Oa2p/iSFlu21

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36e257f1720a643387a3527dd727a021_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36e257f1720a643387a3527dd727a021_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Del1.Bat"
      2⤵
        PID:2336
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k Òøºü²å¼þ
      1⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\SvzxArFYfk.dll

      Filesize

      68KB

      MD5

      8260853572cb6f5594fccd918605ba09

      SHA1

      385c43e34af466239cd98ca0d9be01d3786dc654

      SHA256

      af5ffd703568757c6dd8711b5b786cdad9c9a67cd743655d894e7f9f69919006

      SHA512

      03f2b07eb830fbf7a70685b2ff70e0f3bed5e3e7b687a3ad47044fa4b5eda36e7bcc3643641b555eeeed6d9e4be2164c6f1f55d8517920b8c611348004ff1932

    • C:\Users\Admin\AppData\Local\Temp\Del1.Bat

      Filesize

      192B

      MD5

      a410454b0a23a09ab9b79dfac2aa4ff6

      SHA1

      ccf049fec4e83c9d6d3290921a1c18c801d0982d

      SHA256

      598052aff9b460c55a3c8f1820e24d1bcc0fe054eaa9e4b3f1c28df6cf0b1eb3

      SHA512

      2befd7e666554a2ce7a1aa8d0c6c584bc8db1b2e124f7c67099ef24242b7e397fff8eea6b5c89e676280de5a6c1fd8c7d9d855a1d22252472d6a9a0f9391caae

    • C:\Windows\SysWOW64\drivers\beep.sys

      Filesize

      25KB

      MD5

      4178820661c549189a6d1d97c0aa5466

      SHA1

      0ac9e7d4f165be1b751d1722665a1f69e8138c9b

      SHA256

      f91f28ab82966f904c318bd45729b8a6962abcf6c6a1a6854411f02a93872bbd

      SHA512

      31a43f5edbee09aecc2afaa96f7ced02662578af915e334d57cf2c6b1ef3b99df5c4df26126118720634a0df107d71981bbb041f0e2b6fe8ee576c5b4d256c88

    • memory/3408-2-0x0000000010000000-0x0000000010020000-memory.dmp

      Filesize

      128KB

    • memory/4460-16-0x0000000010000000-0x0000000010020000-memory.dmp

      Filesize

      128KB

    • memory/4460-25-0x0000000010000000-0x0000000010020000-memory.dmp

      Filesize

      128KB