Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 12:14

General

  • Target

    7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe

  • Size

    660KB

  • MD5

    7830bab89c6a95ef26d95a7ead4bea32

  • SHA1

    45d59fee7bd4afb6a1de8e098f4335241dcdc990

  • SHA256

    5b8e888ccbf49eb6f3413fde030c118dc3ac90b9349baa9e34533d628808188b

  • SHA512

    a93466b1c98aa1ba5b611bca47ed8b96a7555ce2b7c3bbd37a93e03791c126cb85708ff233be532da09ffbb47a0524cdfa90c3a6fab1c838e852a349bedfcefa

  • SSDEEP

    12288:EUuymnNMr1yQCgKSFR97yehh8Jhb2vSJXKW2LAMBUij9uMsq5itl:qZKr18gZjj70bQaXKW4xjrP2l

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\7830BA~1.EXE" > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2268
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "360safe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\system32\sp.dll, Launch
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2176

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\Sp.dll

          Filesize

          526KB

          MD5

          0b92e2f0ac593e30cd921f5d2e54ad04

          SHA1

          3e71561bb1e8057eba21752cb10e40aca54f1e4d

          SHA256

          d239cf1435b4063a671bbc121033333a20ab78f1e09226c1f2591bc76a2827f0

          SHA512

          5ae85ad83e3159d7b62529a0bc855ca5c77218cded669a859798691b3c01968ab0b311f6d2669326d37ff0d48e102f04f0997844a3401f04c1ae90cf62aeeabf

        • memory/1900-13-0x0000000000FF0000-0x000000000109A000-memory.dmp

          Filesize

          680KB

        • memory/1900-4-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/1900-5-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/1900-1-0x0000000000FF0000-0x000000000109A000-memory.dmp

          Filesize

          680KB

        • memory/2036-10-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2036-12-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2036-23-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2176-18-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2176-20-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2176-19-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2176-21-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB

        • memory/2176-24-0x0000000075330000-0x000000007550A000-memory.dmp

          Filesize

          1.9MB