Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 15:38

General

  • Target

    3df5a3ded590ad9cf040125ec84dac43_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    3df5a3ded590ad9cf040125ec84dac43

  • SHA1

    6a9caf283a5c0109018333250ab6d937a3012ac9

  • SHA256

    a15545627b2c59118d6e8566abb9e9473039ae0e57f807d6ccaf706a7f027ec6

  • SHA512

    23ca27afa7ac34db6dae69c6ed617b9ac62f84148fec45548673cc52427c1f585bbb1b2d2cb9fd80c6d36f98cfa99893bac2fb30a57b08267decfa5ce6db83b3

  • SSDEEP

    768:jHzDcSmR25QinzxPCAex+L20h01k2BlKvzdP928E/h2I1CdwxpiN:TzD/puinNPCrgJWMeQh

Score
10/10

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3df5a3ded590ad9cf040125ec84dac43_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3df5a3ded590ad9cf040125ec84dac43_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\ip.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Windows\SysWOW64\sc.exe
        sc.exe config rfwservice start= disabled
        3⤵
        • Launches sc.exe
        PID:3008
      • C:\Windows\SysWOW64\net.exe
        net stop rfwservice
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop rfwservice
          4⤵
            PID:4392
        • C:\Windows\SysWOW64\sc.exe
          sc.exe config rsccenter start= disabled
          3⤵
          • Launches sc.exe
          PID:776
        • C:\Windows\SysWOW64\net.exe
          net stop rsccenter
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop rsccenter
            4⤵
              PID:1352
          • C:\Windows\SysWOW64\sc.exe
            sc.exe config rfwproxysrv start= disabled
            3⤵
            • Launches sc.exe
            PID:3740
          • C:\Windows\SysWOW64\net.exe
            net stop rfwproxysrv
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2104
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop rfwproxysrv
              4⤵
                PID:4788
            • C:\Windows\SysWOW64\sc.exe
              sc.exe config kpfwsvc start= disabled
              3⤵
              • Launches sc.exe
              PID:2768
            • C:\Windows\SysWOW64\net.exe
              net stop kpfwsvc
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5080
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop kpfwsvc
                4⤵
                  PID:4504
              • C:\Windows\SysWOW64\sc.exe
                sc.exe config kissvc start= disabled
                3⤵
                • Launches sc.exe
                PID:2096
              • C:\Windows\SysWOW64\net.exe
                net stop kissvc
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2720
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop kissvc
                  4⤵
                    PID:1136
              • C:\WINDOWS\lsas.exe
                C:\WINDOWS\lsas.exe
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1624
                • C:\Windows\SysWOW64\regsvr32.exe
                  regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                  3⤵
                    PID:4888
                  • C:\Windows\SysWOW64\regsvr32.exe
                    regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                    3⤵
                      PID:220
                    • C:\Windows\SysWOW64\regsvr32.exe
                      regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                      3⤵
                        PID:2476
                      • C:\Windows\SysWOW64\regsvr32.exe
                        regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                        3⤵
                          PID:884
                        • C:\Windows\SysWOW64\regsvr32.exe
                          regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                          3⤵
                            PID:520
                          • C:\Windows\SysWOW64\regsvr32.exe
                            regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                            3⤵
                              PID:4108
                            • C:\Windows\SysWOW64\regsvr32.exe
                              regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                              3⤵
                                PID:4356
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                3⤵
                                  PID:3320
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                  3⤵
                                    PID:556
                                  • C:\Windows\SysWOW64\regsvr32.exe
                                    regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                    3⤵
                                      PID:3524
                                    • C:\Windows\SysWOW64\regsvr32.exe
                                      regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                      3⤵
                                        PID:4520
                                      • C:\Windows\SysWOW64\regsvr32.exe
                                        regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                        3⤵
                                          PID:232
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                          3⤵
                                            PID:3048
                                          • C:\Windows\SysWOW64\regsvr32.exe
                                            regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                            3⤵
                                              PID:4500
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                              3⤵
                                                PID:1008
                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                3⤵
                                                  PID:3532
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                  3⤵
                                                    PID:3516
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                    3⤵
                                                      PID:1352
                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                      regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                      3⤵
                                                        PID:4788
                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                        regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                        3⤵
                                                          PID:1572
                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                          regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                          3⤵
                                                            PID:3464
                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                            regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                            3⤵
                                                              PID:3416
                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                              regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                              3⤵
                                                                PID:4644
                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                3⤵
                                                                  PID:4580
                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                  regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                  3⤵
                                                                    PID:4000
                                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                                    regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                    3⤵
                                                                      PID:2452
                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                      regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                      3⤵
                                                                        PID:1596
                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                        regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                        3⤵
                                                                          PID:520
                                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                                          regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                          3⤵
                                                                            PID:2764
                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                            regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                            3⤵
                                                                              PID:4104
                                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                                              regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                              3⤵
                                                                                PID:4380
                                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                                regsvr32 /s "C:\WINDOWS\Msinet.ocx"
                                                                                3⤵
                                                                                  PID:760

                                                                            Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\1.htm

                                                                                    Filesize

                                                                                    393KB

                                                                                    MD5

                                                                                    b0668eccfa826a9d5dbee2fe1a066346

                                                                                    SHA1

                                                                                    dead93641c680d92779a5534640e26b3cb476e3d

                                                                                    SHA256

                                                                                    d4cfbf21c45addbb3d45f4dc0a11798b6a0fd03d196891617c2583df6853821d

                                                                                    SHA512

                                                                                    ad7606c15273533382121a5f285e0826d0721c1ad2383df3934f080628800a253240a6f4ad4e15bef70082a1140f072c293d2a6747f36dac15992b24f183d924

                                                                                  • C:\Windows\lsas.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    3df5a3ded590ad9cf040125ec84dac43

                                                                                    SHA1

                                                                                    6a9caf283a5c0109018333250ab6d937a3012ac9

                                                                                    SHA256

                                                                                    a15545627b2c59118d6e8566abb9e9473039ae0e57f807d6ccaf706a7f027ec6

                                                                                    SHA512

                                                                                    23ca27afa7ac34db6dae69c6ed617b9ac62f84148fec45548673cc52427c1f585bbb1b2d2cb9fd80c6d36f98cfa99893bac2fb30a57b08267decfa5ce6db83b3

                                                                                  • \??\c:\ip.bat

                                                                                    Filesize

                                                                                    309B

                                                                                    MD5

                                                                                    96e5ad84ee4fc99164853f0618c2b0c2

                                                                                    SHA1

                                                                                    d2ddc324d3276d882a0a00bdbd24dc49b0c8deac

                                                                                    SHA256

                                                                                    890e41788ac2a14fd27a75c0a0718f9cb3e3bbe2fae1f7b5730308fd695a9984

                                                                                    SHA512

                                                                                    abc60dab5615a89648e736a9cb0a3cc9b4d2f1ef5d8e6b5a412ec8b0492bfb38ad535ebd11ad06dfd402f56ac6468db8012edb09e404dce1a3b4da7f66ab765a