Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 12:05

General

  • Target

    45bd38bf9f094cd1bab528bdae3b1332_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    45bd38bf9f094cd1bab528bdae3b1332

  • SHA1

    d34122435100d068093eabb4c7b81e8546928102

  • SHA256

    7bab3a0315d92af33df8c6844f94a8a5efb5dff7e250c54c2db01b76d7915034

  • SHA512

    bececfb5558686c9e413c72a9768977f59ef374251db33df6371dc0b437315829eea40779a67522fa3613f6dd17097d58a0829b222aafd361d15a2402f25a34a

  • SSDEEP

    768:eIYeTfP8X068tV/RKkF9tReY3CkYuNEa9GQ0pM:+eTHI068tBRKEtZDvEmGQ0p

Score
10/10

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 11 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45bd38bf9f094cd1bab528bdae3b1332_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45bd38bf9f094cd1bab528bdae3b1332_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Windows\SysWOW64\net.exe
      net stop cryptsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4036
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop cryptsvc
        3⤵
          PID:1220
      • C:\Windows\SysWOW64\sc.exe
        sc config cryptsvc start= disabled
        2⤵
        • Launches sc.exe
        PID:392
      • C:\Windows\SysWOW64\sc.exe
        sc delete cryptsvc
        2⤵
        • Launches sc.exe
        PID:3396
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Users\Admin\AppData\Local\Temp\1720958716.dat, ServerMain c:\users\admin\appdata\local\temp\45bd38bf9f094cd1bab528bdae3b1332_jaffacakes118.exe
        2⤵
        • Deletes itself
        • Loads dropped DLL
        PID:4936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1720958716.dat

      Filesize

      33KB

      MD5

      c08da2229c7f3a98594b809cb44ff1cf

      SHA1

      dfd13f50de379d40ca2121cf956ba695a89b0891

      SHA256

      034de435d4cb1500a997b42f02b9139defdebe0b5d1f05d43a5b5383dd3b86d4

      SHA512

      d5cf5707fbd33bdc486a9d2d31ff9c9b530dda7a3fcac3963971aa4f6419918ffc7a93e61fea6d20427dec167f76f8592c53934f16776b16c6376ff5ad13a951

    • memory/3756-0-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/3756-13-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB