Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 09:35

General

  • Target

    4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    4dbc4b094b789d8f0cfe48e552b2ac9f

  • SHA1

    984ca133b1db7ce3b24bb31fed5c84ed43c59926

  • SHA256

    15ddc2427bb2e867e366ae404c24390cd7f87127f80830b40bd8b0e222eac14f

  • SHA512

    1665acbd0bbffede5c15d2c540548afcda032125529d57c2c1ea040ab895c66b732b08cb810521f3871cb39ee8bc5d813393c489e3d856e68a6d5449732d555a

  • SSDEEP

    768:36Esy4oMuVJ9UFAp5v32pk9M7dZOJZBCN2T328Ro9H/auPl6eQPF0WABg:psH8OFA7K7dya2G4o9RP6PFbX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:824
      • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
        "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
          "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
            "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\4dbc4b094b789d8f0cfe48e552b2ac9f_JaffaCakes118.exe
            5⤵
              PID:2456
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {F63A2B75-FDC6-42C2-A892-9E7D74203D5D} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\Fonts\f54M1v.com
        C:\Windows\Fonts\f54M1v.com
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\Fonts\f54M1v.com
          C:\Windows\Fonts\f54M1v.com
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1448
          • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
            "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Windows\Fonts\f54M1v.com
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1972
            • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
              "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Windows\Fonts\f54M1v.com
              5⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              • Suspicious use of WriteProcessMemory
              PID:1608
              • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
                "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Windows\Fonts\f54M1v.com
                6⤵
                  PID:2072

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Fonts\f54M1v.com

        Filesize

        42KB

        MD5

        4dbc4b094b789d8f0cfe48e552b2ac9f

        SHA1

        984ca133b1db7ce3b24bb31fed5c84ed43c59926

        SHA256

        15ddc2427bb2e867e366ae404c24390cd7f87127f80830b40bd8b0e222eac14f

        SHA512

        1665acbd0bbffede5c15d2c540548afcda032125529d57c2c1ea040ab895c66b732b08cb810521f3871cb39ee8bc5d813393c489e3d856e68a6d5449732d555a

      • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

        Filesize

        42KB

        MD5

        8b4b76153091101657f35f4046cc29aa

        SHA1

        a9175bde0ba221f3a40691817a4aacb5a72f9968

        SHA256

        1980d104518278f4d022d5f573e16c48a0ebdc49065bd0cf4888346ee26d6109

        SHA512

        b980ee10b4a02e4c82dec6e03d054d3197fc3c14a1d388ff6dae55f4932335751f7a9b4f848412845c6ecba337869f84876d7c659a16609ea85ad92d644c1c53

      • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

        Filesize

        42KB

        MD5

        721bc53e3bff8bdd944f40a5b0319fee

        SHA1

        b0543645c2b75ac2f381dd8ace067d92ad21a329

        SHA256

        7889adab3da5bfe97559e64de72c305b51993f4e09da873c53f9da09fcadec06

        SHA512

        ad8bf1a189ab265c0f19bc7bc377753ff61dabf659ebb262aa78399811e28f2990b792e53ad45b3f519d1b80db4c64350fe46782961739f1121846128217ecb5

      • memory/824-2-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-4-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-6-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-13-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-10-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-14-0x0000000010000000-0x000000001000A000-memory.dmp

        Filesize

        40KB

      • memory/824-0-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-8-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/824-12-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/1792-50-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB