Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 19:41

General

  • Target

    3a7b66cc5564274c213891874269c1f6_JaffaCakes118.exe

  • Size

    818KB

  • MD5

    3a7b66cc5564274c213891874269c1f6

  • SHA1

    5728da45fea8b110808b83c737ea28c31fe6ebf7

  • SHA256

    88308dc2f437dfcc0ff07e36fffdd86266868e7a6a2604a9775d21c6d88886b3

  • SHA512

    1a93ac79f4695cf7d6fd4696dc33498e68bfa2545bc42e3ff922c4973bda81c529cd01ba6eaaa7d8c1324974f1c364bdbebb837b5dc0e792d284969d8423ae47

  • SSDEEP

    24576:KPEUOypp6swmemlFL1QHEJlFtov9G/6bqSqRXHYrmE:RULLl3Q9GibfYHYb

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7b66cc5564274c213891874269c1f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7b66cc5564274c213891874269c1f6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\DirectDownloader"
      2⤵
        PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C echo ifms > "C:\Users\Admin\AppData\Local\DirectDownloader\directdownloader.exe"
        2⤵
          PID:2696
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\DirectDownloader\directdownloader.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\DirectDownloader\directdownloader.exe"
            3⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            PID:2336
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\DirectDownloader\directdownloader.exe" "DirectDownloader" ENABLE
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\DirectDownloader\directdownloader.exe" "DirectDownloader" ENABLE
            3⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            PID:2800

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2636-23-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB