Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 04:47

General

  • Target

    335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe

  • Size

    137KB

  • MD5

    335885df4fc5f19bd0d86f39f5abbf33

  • SHA1

    2a42fc61c40745baf2c2ba836b3c9b6440a4665b

  • SHA256

    309f0dff02dd10b09c1fb8a5deab7684a0e5e956cb3473960813221cb4ba61e1

  • SHA512

    c58b1710dc1706aea5e0d9a820c692854466d5f4d9d159da585440df5cdd58cc1cee7bcb4097b764e36fdd0e302876411d9919d1f282da945e61cd658036dd7a

  • SSDEEP

    3072:FWuyq+DphTWLWfIo4Z23BCERu9AJTGd5Y:FWuyq6WLWf14Z2xPRuGFF

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:1652
      • C:\Windows\SysWOW64\sc.exe
        sc config wscsvc start= DISABLED
        2⤵
        • Launches sc.exe
        PID:2288
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
          3⤵
            PID:5032
        • C:\Windows\SysWOW64\sc.exe
          sc config SharedAccess start= DISABLED
          2⤵
          • Launches sc.exe
          PID:2856
        • C:\Users\Admin\AppData\Local\Temp\eaodx4.exe
          C:\Users\Admin\AppData\Local\Temp\eaodx4.exe
          2⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Windows\SysWOW64\net.exe
            net.exe stop "Security Center"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2000
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Security Center"
              4⤵
                PID:3180
            • C:\Windows\SysWOW64\sc.exe
              sc config wscsvc start= DISABLED
              3⤵
              • Launches sc.exe
              PID:4588
            • C:\Windows\SysWOW64\net.exe
              net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2896
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
                4⤵
                  PID:620
              • C:\Windows\SysWOW64\sc.exe
                sc config SharedAccess start= DISABLED
                3⤵
                • Launches sc.exe
                PID:2776
              • C:\Users\Admin\AppData\Local\Temp\eaodx4.exe
                C:\Users\Admin\AppData\Local\Temp\eaodx4.exe -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
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:860
                • C:\Windows\SysWOW64\net.exe
                  net.exe stop "Security Center"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1148
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Security Center"
                    5⤵
                      PID:4112
                  • C:\Windows\SysWOW64\sc.exe
                    sc config wscsvc start= DISABLED
                    4⤵
                    • Launches sc.exe
                    PID:3400
                  • C:\Windows\SysWOW64\net.exe
                    net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4484
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
                      5⤵
                        PID:1128
                    • C:\Windows\SysWOW64\sc.exe
                      sc config SharedAccess start= DISABLED
                      4⤵
                      • Launches sc.exe
                      PID:404
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\6yc5z8g43.bat
                  2⤵
                    PID:2304

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\6yc5z8g43.bat

                  Filesize

                  218B

                  MD5

                  5d5cc8a255a39d4914be26ad987bae1e

                  SHA1

                  25dd23ca466fe0c7bc4437f85b0273e985480147

                  SHA256

                  bfed6d4b07840e4054d928edfa522fc2fa241caab10aede9b4126b3617455950

                  SHA512

                  e7adbd6dce71be392a6d6d5360543c4462c8f0374b9bbffd6232fca253e608a2e39fa9498d03345e34cee1534f394223a5eb70049032c3f4e925be453b4fedce

                • C:\Users\Admin\AppData\Local\Temp\eaodx4.exe

                  Filesize

                  137KB

                  MD5

                  335885df4fc5f19bd0d86f39f5abbf33

                  SHA1

                  2a42fc61c40745baf2c2ba836b3c9b6440a4665b

                  SHA256

                  309f0dff02dd10b09c1fb8a5deab7684a0e5e956cb3473960813221cb4ba61e1

                  SHA512

                  c58b1710dc1706aea5e0d9a820c692854466d5f4d9d159da585440df5cdd58cc1cee7bcb4097b764e36fdd0e302876411d9919d1f282da945e61cd658036dd7a

                • memory/860-18-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/860-19-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/1464-7-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/1464-17-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/4276-0-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/4276-12-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB