Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 00:53

General

  • Target

    658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    658074f0770a6be10048e0c00d4a56af

  • SHA1

    019f6890fe89eb79d117a827ea08e5e69d0e8dac

  • SHA256

    52ee340152fd8b2aed4497ce08434c437d8b1fb455751897f192577f35545353

  • SHA512

    373d4155a1e0e3e6b14e45104a456546d5aefba63fbaa2d4a16a258831983db18ed1b7ceac3543911391a00a276f3abd5f22b304086085d7860e2f2ffebe0c7b

  • SSDEEP

    768:wl+RxOpPNN0nhpOA3JfHYBjgPI9di6N4xmhQhIUV5VekqgerEZH4sSnKeGzE:wl/NOx4BOCHBmeUVBerEZ/S/UE

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "file.bat"
      2⤵
        PID:2684
      • C:\Windows\services.exe
        C:\Windows\services.exe
        2⤵
        • Modifies security service
        • Windows security bypass
        • Executes dropped EXE
        • Windows security modification
        • Adds Run key to start application
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "file.bat"
          3⤵
            PID:2808
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "file.bat"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall set opmode DISABLE
              4⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2188

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\file.bat

        Filesize

        124B

        MD5

        ee3c16a6e1cc9ee088d4ce6f03bd9f6d

        SHA1

        213ab6b01142463942d7e7cdae99869ef37da288

        SHA256

        c5b49b4bf2ee5ffc107b5520a2bb09d619167600a921ab2bb29f4b3f17310263

        SHA512

        c0ad9012241d4234156ca640727c9db0413746e48c045532ec35c61db64b5389c1d4ca4ee79dbba09a9780da8864372a7dea2f2ed943e715ae98420d79c5ac09

      • C:\Windows\file.bat

        Filesize

        63B

        MD5

        6c9d99e88d146f567bbfc6652f6955ec

        SHA1

        431d07dcbb0ba309abc7e557f28f45549432c3fe

        SHA256

        e460f82ea21e37a04d4e0fad3f88142fe6891a5d73d2fa29b3eb7628e60831b9

        SHA512

        f7fb41fbb72a2d509dfe9ac4d640cccb719bdf438f48630f8bfce87d9e85c19abacaf3e59dc81657c7b5f10837054f07aa2a67dbbb8499b3e075281f331e9f7e

      • C:\Windows\file.bat

        Filesize

        40B

        MD5

        f5e059efe5ed14466033f1f4357a4a4b

        SHA1

        ccb28b2be69275c38738947e790c10a2382302c2

        SHA256

        c7d0b4156b557c67d3e758d86a45e31c70110c989e679097f52f3edaf4963e21

        SHA512

        d36ef9a9fe8b42951648933fdc41b9b61077bfb4221360f9308104f05e88d17ffdb07948a29858d2f4371db1def154cc4b4be57304c322934a763f6e8b8872de

      • C:\Windows\services.exe

        Filesize

        44KB

        MD5

        658074f0770a6be10048e0c00d4a56af

        SHA1

        019f6890fe89eb79d117a827ea08e5e69d0e8dac

        SHA256

        52ee340152fd8b2aed4497ce08434c437d8b1fb455751897f192577f35545353

        SHA512

        373d4155a1e0e3e6b14e45104a456546d5aefba63fbaa2d4a16a258831983db18ed1b7ceac3543911391a00a276f3abd5f22b304086085d7860e2f2ffebe0c7b

      • memory/2956-0-0x0000000000FB0000-0x0000000000FEA000-memory.dmp

        Filesize

        232KB