Analysis

  • max time kernel
    150s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 18:00

General

  • Target

    643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe

  • Size

    484KB

  • MD5

    643584014e1ca57e7b0d124d27fdc719

  • SHA1

    5fc0b7f479e8e52f3eb251ed87cf068732e64d72

  • SHA256

    c91a8f6b64d181d9e4df587860aeb73b6136bc6f20db78ac725292407c109f09

  • SHA512

    e050664fb958cbd778ad6e678d0b9c2e89fed1f2f6996dc8619fda43ee655b8a4b846ad5c6679f2654fb6ec6886e97fd66464469e687e3fb4ab88120e0599a02

  • SSDEEP

    12288:zP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:zPoBHch+uudKNffiv1aVSaPTeO

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious use of UnmapMainImage
    PID:332
  • C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Users\Admin\V6oUpCF0mC.exe
        C:\Users\Admin\V6oUpCF0mC.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\pkgoat.exe
          "C:\Users\Admin\pkgoat.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del V6oUpCF0mC.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2768
      • C:\Users\Admin\ayhost.exe
        C:\Users\Admin\ayhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Users\Admin\ayhost.exe
          "C:\Users\Admin\ayhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2116
      • C:\Users\Admin\byhost.exe
        C:\Users\Admin\byhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Users\Admin\byhost.exe
          "C:\Users\Admin\byhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Windows\explorer.exe
            0000003C*
            5⤵
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:936
      • C:\Users\Admin\cyhost.exe
        C:\Users\Admin\cyhost.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Users\Admin\cyhost.exe
          C:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming
          4⤵
          • Executes dropped EXE
          PID:1708
        • C:\Users\Admin\cyhost.exe
          C:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp
          4⤵
          • Executes dropped EXE
          PID:1604
      • C:\Users\Admin\dyhost.exe
        C:\Users\Admin\dyhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2744
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe
        3⤵
        • Deletes itself
        PID:2924
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2668
  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
    1⤵
    • Loads dropped DLL
    PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3FF8.555

    Filesize

    600B

    MD5

    0747d1f4c0cf402b5aaab5d8f6e1ca81

    SHA1

    5d4b58cae4fefafcaa6947d45c056ed3b0f5f1f3

    SHA256

    215e303dc63ebd9a9bb5502b85173bdc3c655da39dbc98fc671ae2ec6e892366

    SHA512

    db5a57e1c23181ee9b68ca14da36559d0b70634683b825154309b926caf96070540b5f6ceabca565035ff2d5e55e5f9128f88f278a916117172d3917ccc5690d

  • C:\Users\Admin\AppData\Roaming\3FF8.555

    Filesize

    996B

    MD5

    e72ece3d792c217354fff5e64a7045d3

    SHA1

    ba8e8bd5ffad3e82676f1d9c0c89e1ec8559cc59

    SHA256

    6b1ab449ce751b9ec680489f73079693dbfb245f406d57afc9f80b35d9f9f70c

    SHA512

    2e3fc6c006fcf1b862c227d21382ab65bd71c46cfb115aeaa2d820f5ec750ac453b91e81790917d4f0cc11bd406cd418cc5c05e179ff3127ca7f88ca7948b95e

  • C:\Users\Admin\AppData\Roaming\3FF8.555

    Filesize

    1KB

    MD5

    78acfb6e213565c0f240dde2b5421bd2

    SHA1

    d6a789d6536aea19ad79d72cf6fcaa8bbd043424

    SHA256

    36976bc3cc1578e68b133a08f8b3fa57fdb334ec0f277db074e09a8e543497b8

    SHA512

    66ab470773c1f55550bbfa237433b751cea545fb188d0ff18449cd0980d602c5acabfcabb8ce23b2c22d0789a2205d88bc565480583fcd31208bdcda775b341c

  • C:\Users\Admin\ayhost.exe

    Filesize

    68KB

    MD5

    2c7c2d4e9c03a1818621def0e1281a81

    SHA1

    c92b29a7f6e9998c7a86b9b57cff15f28647a127

    SHA256

    9fb6cf502b6a872ed2e58666672db9fdc0eb57e6ff5a5677b6dbc8de42193f3e

    SHA512

    431cadf9b1d4de1dd0c5efebd5bae2af2ac0f6c98a2d71a5f7bc72e2421ecf77d67616d805bb643680192de6c8921e894a48a538276492567524c4267a4e4a66

  • C:\Windows\system32\consrv.DLL

    Filesize

    53KB

    MD5

    68689b2e7472e2cfb3f39da8a59505d9

    SHA1

    5be15784ab1193dc13ac24ec1efcabded5fe2df4

    SHA256

    f304eb2cf6479a4fb36fef81c6df4d0225e251002e8f06f26ee196210bf3d168

    SHA512

    269999061cd54b23b92d385689682e687ae9030bc5d26d79dd5e99f72fa4b4eef41f5a7b555325bd558771db92e2feb8a67fb40c87223be9e23ccb498b3bbc88

  • \Users\Admin\V6oUpCF0mC.exe

    Filesize

    332KB

    MD5

    b96dc0230580570446ab648e20a7e3b3

    SHA1

    27483df87ef7093d51062fb2d2fc9944f94c23fb

    SHA256

    2c65220c1c3ec6cb3282759e1d583b598ad43bf09484239325ae06b961bf0af0

    SHA512

    b8dd8743eb45f9dcc0d74b5cf450ef2950482e5c33dcdb5ab9494ad2e396d7ea5ebd80d477fca52a25a46cede6e2c31eb2647612090fda72d7e61e49913c042f

  • \Users\Admin\byhost.exe

    Filesize

    136KB

    MD5

    1d0f81b6e185ec95e716d2a0b2ba69a1

    SHA1

    09399ffa69ae8bfd9794104bc4b7b4f481980e3a

    SHA256

    abe89315434ce50001a90c9bdd662a0c42fa90d95acdf5baed5823d760e4f878

    SHA512

    6c4ecc1346bfc9952d7a1a2cb30ed5076bec24db099bb3fe20a248b19f56c075ff592d03100a1a3660ad5f47dfaff6a64b6b2bebe1bcbc7ce747f968a4c7e6b1

  • \Users\Admin\cyhost.exe

    Filesize

    168KB

    MD5

    234bf3937f8fe09351acc53c059b40d2

    SHA1

    256f162b65eacc7a1fee35722fbfdbd55bba93c7

    SHA256

    86c568452305c3943eb7d1530cef65c75f6fac39d178082783db8b12fc8eef2b

    SHA512

    6c768729abebd0b9bde9712ee827262c433ac928bb638b9176ef7f4085c2d2b4fdfa3cacffdb7da477d23a1e0ce32e63cba2ab9ace1f45dfcc8109b2c68812b7

  • \Users\Admin\dyhost.exe

    Filesize

    24KB

    MD5

    9814ec05c8857737f599ba75b1610fb1

    SHA1

    aa9d9b016c2feda03cf6ad1bbca332070eb9b295

    SHA256

    a68f44fa166ade605dfd2e5827a8ca3fa21141eda423c096d1f41d9bf172e597

    SHA512

    c9daf5d8015ab4d5e0c333b986e04a917a596aef6d61baf43f53e5da346e3e665cd16eb5da35726713689dca991a03fbfa137b7f3f879c77779a477a89a0268d

  • \Users\Admin\pkgoat.exe

    Filesize

    332KB

    MD5

    f79e8aa98ea718f891b40dd78b7174a5

    SHA1

    6cc62182c6e465390422b6ade4f6cd41566601c6

    SHA256

    596e0ec2d4d252eee0b0776ffe3e2c63c43878b56d1b92dab5a75473376d197a

    SHA512

    91a667608ea1a1848e9e68aa88386571552b81ff137015bc8ba581ab6806b9b9f6be34b1dbe3ae327401de45a6f44df93dd6abbfb3eff7336443f75a719cb0fd

  • \Windows\assembly\GAC_32\Desktop.ini

    Filesize

    4KB

    MD5

    ff7d5ec20bf73c02317e7a740fffe018

    SHA1

    365ac8cfe5b939854cc1c341caf051bcc45f9372

    SHA256

    1e230847d7034f5ab3bf010f569315e00673859af0574fc9f915636ed905779a

    SHA512

    30854c0d703fd7c6cbc0769d9be4125baa2577ec529d5e48177a434685b66752fd79c50f0321324e23eeb985738f403347748afefae7d8a3bfad388a5b512a44

  • \Windows\assembly\GAC_64\Desktop.ini

    Filesize

    5KB

    MD5

    3e7a118b119428247edfc5d5ef3761bc

    SHA1

    140e4cb00107678160411f016c4c17611580a209

    SHA256

    97c19f4103a16798202e50a501375d0bf3d7ec1bb654dda230337e85b01b1ec5

    SHA512

    b0e27a4d7aa62f937f275b9f413f75857846ae670bf3aed6e55c1db865485fda89e33dcdffa02ae2ab25f48d5f63f869232f9e6d69f9cdc8a5c93f39de09a925

  • memory/332-122-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/936-99-0x0000000000300000-0x0000000000319000-memory.dmp

    Filesize

    100KB

  • memory/936-109-0x0000000000300000-0x0000000000319000-memory.dmp

    Filesize

    100KB

  • memory/936-104-0x0000000000300000-0x0000000000319000-memory.dmp

    Filesize

    100KB

  • memory/1008-93-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1008-88-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1008-82-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1008-84-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1008-95-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1008-86-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1008-91-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1708-140-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/2116-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-67-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-71-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-60-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-69-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-58-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-56-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-54-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2292-12-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-6-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2292-2-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-141-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-10-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-13-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-15-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-4-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2292-346-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2688-146-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB