Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 13:54

General

  • Target

    67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    67d7c08c8413ddc24efd9744d96af8c2

  • SHA1

    2ea88cd2ec5e74d361efb1a9a6433d55e4f2abb4

  • SHA256

    793d14f51a1af09192f9846e8408bf66241ee5c17c0d8abeb575f4cff4f05d3b

  • SHA512

    bb0675ac0d6f7c9b41ecf3968e66324d4b93cd58634d5c0bafeaf90fa6ade9e3100d41205805453e741a891ca87a62d29a1e0b885bdd8e466e86836506982265

  • SSDEEP

    768:VsK/sKcsBqkKSZPrj3RBMvIrN/jCYpKVu5pK8dv4pkn06FQtXHJxQ9E:JUwwaBbrN4I5ptdCi0F1HQm

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:604
    • C:\Users\Admin\AppData\Local\Temp\67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\system32\urqPhiIA.dll,a
        2⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\system32\fccdaaBq.dll",s
          3⤵
            PID:5008
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe"
          2⤵
            PID:4368

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\removalfile.bat

          Filesize

          43B

          MD5

          9a7ef09167a6f4433681b94351509043

          SHA1

          259b1375ed8e84943ca1d42646bb416325c89e12

          SHA256

          d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7

          SHA512

          96b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df

        • C:\Windows\SysWOW64\cbXPiJaa.dll

          Filesize

          36KB

          MD5

          2377d7567d7296f47a68eab0db975e5c

          SHA1

          7ef5871c460d085217a085eef96dce247c200f3c

          SHA256

          df9d00c3bbafb30bab32d05982ae5ef196c540a66b0fd5795eae25e158a9131a

          SHA512

          c163e3069cb501eecf54910650134dbad8ed4e93e801e38f003b8045e362f1b6b077ad01d0156f98c2f94f131923094addd2252fd0c19f6d8d0a9bcde50d4b9b

        • C:\Windows\SysWOW64\fccdaaBq.dll

          Filesize

          1KB

          MD5

          fd90302b492144848d0b6e1586b8ff59

          SHA1

          d4113b3dd8562bd35b83fc061c150e40be88de62

          SHA256

          f860168eb8130d37f549410bb59e3931e4a2dfb94cb49a1bb8675651433ffbc0

          SHA512

          45d9a6eac2c3b70d549edcf524628493250516a77a3f6593ae673debb1996a425cf76eb1de8eb0d0382c762e3c2b75255b0b53701be2e1845c30748e2d4660bd

        • memory/1296-11-0x0000000010000000-0x0000000010014000-memory.dmp

          Filesize

          80KB

        • memory/1296-19-0x0000000010000000-0x0000000010014000-memory.dmp

          Filesize

          80KB

        • memory/1296-3-0x0000000000470000-0x000000000047B000-memory.dmp

          Filesize

          44KB

        • memory/1296-5-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1296-12-0x0000000010000000-0x0000000010014000-memory.dmp

          Filesize

          80KB

        • memory/1296-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1296-13-0x0000000010000000-0x0000000010014000-memory.dmp

          Filesize

          80KB

        • memory/1296-4-0x0000000000408000-0x0000000000411000-memory.dmp

          Filesize

          36KB

        • memory/1296-20-0x0000000000470000-0x000000000047B000-memory.dmp

          Filesize

          44KB

        • memory/1296-2-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1296-1-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1740-31-0x0000000000F10000-0x0000000000F11000-memory.dmp

          Filesize

          4KB

        • memory/1740-32-0x000000001000E000-0x0000000010013000-memory.dmp

          Filesize

          20KB

        • memory/1740-30-0x0000000010000000-0x0000000010014000-memory.dmp

          Filesize

          80KB

        • memory/1740-39-0x0000000010000000-0x0000000010014000-memory.dmp

          Filesize

          80KB

        • memory/1740-41-0x0000000000F10000-0x0000000000F11000-memory.dmp

          Filesize

          4KB