Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 02:35

General

  • Target

    43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe

  • Size

    26KB

  • MD5

    43f4a2878cadd6343b497ff2fb490856

  • SHA1

    7909df003d31fe602dcf02427221b6a3fcca2585

  • SHA256

    f6040b4047094868e17be9428ea636efb9406f6526e2eb10a3f3917e48c96f6a

  • SHA512

    1742a70157a5872346acb2724ae9de324633f92cb7429061735587359ba01c7d3ab95b96fe6b8cd60f6a47192e1793c164769f63bcc8d56e3d5b732e21953a88

  • SSDEEP

    768:Chw2aHt0dcYsITFT2jqQKG/d4uH8Czb0OmSM:Ww2UF9IJs5f/d42zbgb

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Program Files\Common Files\System\tdhleba.exe
      "C:\Program Files\Common Files\System\tdhleba.exe"
      2⤵
      • Modifies security service
      • Modifies visiblity of hidden/system files in Explorer
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3844
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y| cacls C:\Program Files\dld.dat /t /g everyone:F
        3⤵
          PID:4752
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            4⤵
              PID:4552
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Program Files\dld.dat /t /g everyone:F
              4⤵
                PID:4420
          • C:\Program Files\Common Files\Microsoft Shared\tettaje.exe
            "C:\Program Files\Common Files\Microsoft Shared\tettaje.exe"
            2⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:3164
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y| cacls C:\Program Files\meex.exe /t /g everyone:F
              3⤵
                PID:3396
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  4⤵
                    PID:4128
                  • C:\Windows\SysWOW64\cacls.exe
                    cacls C:\Program Files\meex.exe /t /g everyone:F
                    4⤵
                      PID:4916
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                  2⤵
                    PID:3264
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                    2⤵
                      PID:1440
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                      2⤵
                        PID:3772
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                        2⤵
                          PID:3312
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                          2⤵
                            PID:1112
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                            2⤵
                              PID:3940
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                              2⤵
                                PID:3088
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                2⤵
                                  PID:1144
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                  2⤵
                                    PID:3400
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                    2⤵
                                      PID:3428
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                      2⤵
                                        PID:4440
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                        2⤵
                                          PID:2976
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                          2⤵
                                            PID:4368
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                            2⤵
                                              PID:2872
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                              2⤵
                                                PID:824
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                2⤵
                                                  PID:2028
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                  2⤵
                                                    PID:1812
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                    2⤵
                                                      PID:2608
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                      2⤵
                                                        PID:1412
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                        2⤵
                                                          PID:2060
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                          2⤵
                                                            PID:1644
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                            2⤵
                                                              PID:2464
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                              2⤵
                                                                PID:1116
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                                2⤵
                                                                  PID:2968

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Program Files\Common Files\System\nkedjdo.inf

                                                                Filesize

                                                                169B

                                                                MD5

                                                                a54b00618165462a8efb329fed687faa

                                                                SHA1

                                                                11aeca130e833935fe7efdb8403433eb271cc4f8

                                                                SHA256

                                                                ee4862d6ebf8e622959c213db4513d043bb8fede1e376f908ae09f7bcf75e244

                                                                SHA512

                                                                72de05b116bd3c2d00393f1076942df1e328c257aceffd16aeda09841bf4e2f20a8fa0dcf1782512cb4bbe5781056ec8ee67ea95eb204d891013b6f2204271be

                                                              • C:\Program Files\Common Files\System\tdhleba.exe

                                                                Filesize

                                                                26KB

                                                                MD5

                                                                43f4a2878cadd6343b497ff2fb490856

                                                                SHA1

                                                                7909df003d31fe602dcf02427221b6a3fcca2585

                                                                SHA256

                                                                f6040b4047094868e17be9428ea636efb9406f6526e2eb10a3f3917e48c96f6a

                                                                SHA512

                                                                1742a70157a5872346acb2724ae9de324633f92cb7429061735587359ba01c7d3ab95b96fe6b8cd60f6a47192e1793c164769f63bcc8d56e3d5b732e21953a88

                                                              • memory/3060-1-0x0000000002170000-0x0000000002171000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/3060-2-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3060-0-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3060-17-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3164-46-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3164-16-0x0000000000650000-0x0000000000651000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/3164-15-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3164-14-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3164-47-0x0000000000650000-0x0000000000651000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/3844-8-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3844-44-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3844-45-0x0000000000540000-0x0000000000580000-memory.dmp

                                                                Filesize

                                                                256KB

                                                              • memory/3844-9-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/3844-10-0x0000000000540000-0x0000000000580000-memory.dmp

                                                                Filesize

                                                                256KB