Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 02:23

General

  • Target

    5eac2c707c748434b14993582f62a679_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    5eac2c707c748434b14993582f62a679

  • SHA1

    df603f3d98ed574a72c54415b22be65cb9cf6cf2

  • SHA256

    9678948e21027247d80264c524f3b88e71a83393e15dd9e42b20b9bda9759603

  • SHA512

    b02143f296e4efc2db698fd8bffc48144712259ba1cb6c4520377e9263dec1cc2f19a2cefbf3430d7be524e6a38f31d3a2e9bc66aadcad4c8295af3cad3a0e10

  • SSDEEP

    192:ofzy2j9N/lfXNnITBrnOHbFGOPx1Q5ubiOPqr/M8HyaoVdmnYQdR:Yzy25NF9nc5nQJ1Q5ubiND8Vdmh

Score
10/10

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Stops running service(s) 4 TTPs
  • Drops file in System32 directory 4 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eac2c707c748434b14993582f62a679_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5eac2c707c748434b14993582f62a679_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\SysWOW64\net.exe
      net stop cryptsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop cryptsvc
        3⤵
          PID:1212
      • C:\Windows\SysWOW64\sc.exe
        sc config cryptsvc start= disabled
        2⤵
        • Launches sc.exe
        PID:2208
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im soul.exe /T
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2060
      • C:\Windows\SysWOW64\sc.exe
        sc delete cryptsvc
        2⤵
        • Launches sc.exe
        PID:2932
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im zeroonline.exe /T
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2944

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads