Analysis

  • max time kernel
    148s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 21:57

General

  • Target

    83b2f9af28b3a8264ad2859f3bc39a4c_JaffaCakes118.exe

  • Size

    456KB

  • MD5

    83b2f9af28b3a8264ad2859f3bc39a4c

  • SHA1

    f57e1f7c762886a26eab4b602537e8ba714eaa1b

  • SHA256

    e357d052b832e68ca838eec84d57d926ffec5c532976be411d9bdc99d50179a2

  • SHA512

    93db41bb606d51052365be8843ea143cf8e8538743d786a50a6b66de42cabb87def040dbb7a7517fc69338d8a2b5f2223278619e5b24ecd59cc14e3e1a8314bc

  • SSDEEP

    12288:jufWQd0muwMkk0jT1hG4l817Dtz35kAvY4Y9JsFD72pNIIxNiTR:za0muwFb8s9OE6ui

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83b2f9af28b3a8264ad2859f3bc39a4c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83b2f9af28b3a8264ad2859f3bc39a4c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\ProgramData\syshost.exe
      C:\ProgramData\syshost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\ProgramData\syshost.exe" /t REG_SZ /d "C:\ProgramData\syshost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\ProgramData\syshost.exe" /t REG_SZ /d "C:\ProgramData\syshost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2684
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\9O7PRKBVE8.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\9O7PRKBVE8.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\9O7PRKBVE8.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\9O7PRKBVE8.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\syshost.exe

    Filesize

    6KB

    MD5

    36c689700adbb227867e409938607270

    SHA1

    6123e236f73faa37600a60107a5b167980b83a61

    SHA256

    a2158014ecd471868954d0e97397f9df43e310c48d56fa0b5a6ef908dc654adf

    SHA512

    c75728ed30135032a6755e33b9034b98c871554c33a4b8ba1586e0b3282dbc65e3b61571d407365b24289dae2de56b514ef0db744f85e6648dc6432a33b85fef

  • memory/2464-28-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-29-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-44-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-43-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-17-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2464-14-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-12-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-40-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-37-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-11-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-31-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-32-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-33-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2464-35-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2960-21-0x0000000074630000-0x0000000074BDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-2-0x0000000074630000-0x0000000074BDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-0-0x0000000074631000-0x0000000074632000-memory.dmp

    Filesize

    4KB

  • memory/2960-1-0x0000000074630000-0x0000000074BDB000-memory.dmp

    Filesize

    5.7MB