Analysis Overview
SHA256
bb1f27012dd99cbabf84de27c318253412024eea473351764b9c23cda11fa55e
Threat Level: Likely malicious
The file 87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Possible privilege escalation attempt
Deletes itself
Loads dropped DLL
Modifies file permissions
Drops file in System32 directory
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Kills process with taskkill
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-10 22:00
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-10 22:00
Reported
2024-08-10 22:03
Platform
win7-20240704-en
Max time kernel
12s
Max time network
19s
Command Line
Signatures
Possible privilege escalation attempt
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\imm32.dll | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\ole.dll | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\imm32.dll.log | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\imm32.dll.log | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\takeown.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\icacls.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM NVCAgent.npc
C:\Windows\SysWOW64\takeown.exe
takeown /F C:\Windows\system32\imm32.dll
C:\Windows\SysWOW64\icacls.exe
icacls C:\Windows\system32\imm32.dll /grant administrators:f
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c c:\clr_f781cf3.bat
Network
Files
C:\Windows\SysWOW64\IMM32.DLL
| MD5 | 6d4e128226e9a8bcf5c53e48bd1178bb |
| SHA1 | 48ba28d38791f2f3ea3d996caa47e37a858e7cb9 |
| SHA256 | 9c04219f94b7727743856b18dda03e1c94942145aa66c0ced74a205226d0c98d |
| SHA512 | bb157e0a5ff2524de9dc52dde1af2b0175e15c6e8081ddd505a8fb9cf89191bd20149f3b79a355680ccf350100a95d20551a205ff0f550397ff067d211bce379 |
\Windows\SysWOW64\ole.dll
| MD5 | 0bd927c9588476831fd7e096460cdc79 |
| SHA1 | c12213cd242fb6f4504078281145692c7d050fa5 |
| SHA256 | 963fdf95afe9ccc0b48b837ccdd9d9e92e9356f01b3a66e95c761db331ac9401 |
| SHA512 | 5c8c69dc20f3dfb89fcca071770239238b5f263170c24a884ad71e17848d051fc3cf8961328a716f6efd8369f5a586da4c09fc0c73f5aaea6e56036d00356a24 |
\??\c:\clr_f781cf3.bat
| MD5 | bd7f32e5b753dd957f0d7e54a8d8be86 |
| SHA1 | da7d3a7493c76b0333560b8642610c045ebc60dd |
| SHA256 | faf26000df3d93cfb590575098e1643bf605ac34a5a7582c0d2984b90a2c3317 |
| SHA512 | 19aa79ffde543e937b42c9434b66292a855ab93f45a438761c81431de5373c3376210737f5fa47258bba2854383fc4fb30f94457b9e3aa9b64b66a1ee10da796 |
memory/2304-14-0x0000000074B20000-0x0000000074B90000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-10 22:00
Reported
2024-08-10 22:03
Platform
win10v2004-20240802-en
Max time kernel
136s
Max time network
129s
Command Line
Signatures
Possible privilege escalation attempt
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\ole.dll | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\imm32.dll.log | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\imm32.dll.log | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\imm32.dll | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\takeown.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\icacls.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM NVCAgent.npc
C:\Windows\SysWOW64\takeown.exe
takeown /F C:\Windows\system32\imm32.dll
C:\Windows\SysWOW64\icacls.exe
icacls C:\Windows\system32\imm32.dll /grant administrators:f
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c c:\clr_e57ac3e.bat
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 192.142.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
Files
memory/4268-9-0x0000000076510000-0x0000000076535000-memory.dmp
\??\c:\clr_e57ac3e.bat
| MD5 | 13156545cf5e224b30d5b73e04ea6547 |
| SHA1 | 446852dbb55e172483a3ecf37713a2aef27c3bc6 |
| SHA256 | 92c726a2319b1a48e021dd885b80f2aa20b039b54b41c50738365cc399df46b7 |
| SHA512 | 7e1a3acc7ad643699766bda1de55dab87466064cf271d7bce1a817a6f9a598fc994fc3ef6e9247855dd95f78bfb32e4e6b6c8882b8e7db784ecc4e6de99105cd |