Analysis

  • max time kernel
    27s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 03:35

General

  • Target

    3bda594b9f74d91b68cd8928101d3837_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    3bda594b9f74d91b68cd8928101d3837

  • SHA1

    319152570f8f8afe7fae78829345c5c1a0c96119

  • SHA256

    2e94a9e5bc50fbf0116cad613fd2311834b49ef61dc68864320bb892bfbf36d0

  • SHA512

    75bf17ac5cfdbf8349d0eb4b445db9f9a6b3340173c465caf16bdbc2244b22ea61f8f65620cb02d78746ee9dd1eefd52ff21d3c8705b22c13b8ec0eef4d3cf87

  • SSDEEP

    1536:PmsoBCOLT3Nvqyt2KLLtIJWVStm1wDOJznouy8:PkpN7tjLWJWRYOpout

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Drivers directory 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bda594b9f74d91b68cd8928101d3837_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3bda594b9f74d91b68cd8928101d3837_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\A7A5.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\A7A5.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A7A5.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\3bda594b9f74d91b68cd8928101d3837_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\A802.tmp\batchfile.bat
        "C:\Users\Admin\AppData\Local\Temp\A802.tmp\batchfile.bat"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\SysWOW64\spba.exe
          "C:\Windows\system32\spba.exe" 0C:\Users\Admin\AppData\Local\Temp\A802.tmp\batchfile.bat
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Windows\SysWOW64\avdvt.exe
            "C:\Windows\system32\avdvt.exe" 0C:\Windows\SysWOW64\spba.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\SysWOW64\iryn.exe
              "C:\Windows\system32\iryn.exe" 0C:\Windows\SysWOW64\avdvt.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in System32 directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2236
              • C:\Windows\SysWOW64\ibrve.exe
                "C:\Windows\system32\ibrve.exe" 0C:\Windows\SysWOW64\iryn.exe
                7⤵
                • Executes dropped EXE
                PID:2584
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "
        3⤵
          PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\selfdel0.bat

      Filesize

      158B

      MD5

      e8fb811d8a3042dd4da0cf66cc7674bc

      SHA1

      b1376414ffe25eb5ff0e3c31c694e80c7ae58acf

      SHA256

      1b78fc5803e691894f89b71dbd6c946365a630a9a86c4595cd62606c23182789

      SHA512

      9a1c0e76e597ff900299045d0f5b157636e3650a9ed1aad2dbdd30b420f66ad87df28877b9a4bb809ec3d3ac659cb936c519f000b80a0182f5a639df88141594

    • C:\Windows\system32\drivers\etc\services

      Filesize

      17KB

      MD5

      d9e1a01b480d961b7cf0509d597a92d6

      SHA1

      a6c322bf661502b33ab802de67022dd21ac87d9a

      SHA256

      b26309dfd89a9cc94481536b4d662941429df79873bb59620f53db939ff5ec29

      SHA512

      c8653c60d702a29e5bc68cc4dd09baf0d022d6687eb0e3c7731e6a3ebbeaaf17b127bd970fad53140c4155faf70697b631e1b7fd03318d340ae2ee8813e7ad69

    • \Users\Admin\AppData\Local\Temp\A7A5.tmp\b2e.exe

      Filesize

      63KB

      MD5

      51495cd9715541d80e09b5cf47b1bc92

      SHA1

      a24795e917d3ca66bbc7f6def31447a9ee62b1cb

      SHA256

      e741ab59f3e13d4da463d8e5756264f266a293c9faf9a15ebdce96bab215d1c6

      SHA512

      ffe56477d1b513d4b20a33f0ba71d805a0073d6ab1b249d11e3254073b63568cea4d2f2e1ca943132531abc05be6cec5d350f1593068f2eae217aa3ebd4fc9b7

    • \Users\Admin\AppData\Local\Temp\A802.tmp\batchfile.bat

      Filesize

      55KB

      MD5

      f5e0d02aef7c1e449eeb56cd3d39b362

      SHA1

      4078c3e444da907ac899e4d629339230ff4a6773

      SHA256

      0eaf6124be27a0aee7a551f4a657b7903b65def69f040b43855135b710073310

      SHA512

      7e3e837c010856f743962a7d042d4606897bdc62bee33efdd8e2734a3598f23481e87b9d61610968672fae28ff1c39c03b98545cff7d13fa42401b6ee739993d

    • memory/1304-88-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1304-73-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2200-45-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2200-32-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2236-89-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2236-106-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2236-102-0x0000000000580000-0x00000000005AB000-memory.dmp

      Filesize

      172KB

    • memory/2236-103-0x0000000000580000-0x00000000005AB000-memory.dmp

      Filesize

      172KB

    • memory/2332-22-0x0000000002100000-0x000000000212B000-memory.dmp

      Filesize

      172KB

    • memory/2332-23-0x0000000002100000-0x000000000212B000-memory.dmp

      Filesize

      172KB

    • memory/2332-12-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2332-56-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2332-30-0x0000000002100000-0x000000000212B000-memory.dmp

      Filesize

      172KB

    • memory/2584-104-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2584-109-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2744-72-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2744-47-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/3060-10-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/3060-0-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB