Malware Analysis Report

2024-11-16 12:56

Sample ID 240810-1wttxszfjm
Target 87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118
SHA256 bb1f27012dd99cbabf84de27c318253412024eea473351764b9c23cda11fa55e
Tags
discovery exploit
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

bb1f27012dd99cbabf84de27c318253412024eea473351764b9c23cda11fa55e

Threat Level: Likely malicious

The file 87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

discovery exploit

Possible privilege escalation attempt

Deletes itself

Loads dropped DLL

Modifies file permissions

Drops file in System32 directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Kills process with taskkill

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-10 22:00

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-10 22:00

Reported

2024-08-10 22:03

Platform

win7-20240704-en

Max time kernel

12s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe"

Signatures

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\takeown.exe N/A
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A
N/A N/A C:\Windows\SysWOW64\takeown.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\imm32.dll C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\ole.dll C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\imm32.dll.log C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\imm32.dll.log C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\takeown.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\icacls.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\takeown.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2364 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 2364 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 2364 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 2364 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 2364 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 2364 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 2364 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 2364 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 2364 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 2364 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 2364 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 2364 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 2364 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2364 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2364 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2364 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe"

C:\Windows\SysWOW64\taskkill.exe

taskkill /F /IM NVCAgent.npc

C:\Windows\SysWOW64\takeown.exe

takeown /F C:\Windows\system32\imm32.dll

C:\Windows\SysWOW64\icacls.exe

icacls C:\Windows\system32\imm32.dll /grant administrators:f

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c c:\clr_f781cf3.bat

Network

N/A

Files

C:\Windows\SysWOW64\IMM32.DLL

MD5 6d4e128226e9a8bcf5c53e48bd1178bb
SHA1 48ba28d38791f2f3ea3d996caa47e37a858e7cb9
SHA256 9c04219f94b7727743856b18dda03e1c94942145aa66c0ced74a205226d0c98d
SHA512 bb157e0a5ff2524de9dc52dde1af2b0175e15c6e8081ddd505a8fb9cf89191bd20149f3b79a355680ccf350100a95d20551a205ff0f550397ff067d211bce379

\Windows\SysWOW64\ole.dll

MD5 0bd927c9588476831fd7e096460cdc79
SHA1 c12213cd242fb6f4504078281145692c7d050fa5
SHA256 963fdf95afe9ccc0b48b837ccdd9d9e92e9356f01b3a66e95c761db331ac9401
SHA512 5c8c69dc20f3dfb89fcca071770239238b5f263170c24a884ad71e17848d051fc3cf8961328a716f6efd8369f5a586da4c09fc0c73f5aaea6e56036d00356a24

\??\c:\clr_f781cf3.bat

MD5 bd7f32e5b753dd957f0d7e54a8d8be86
SHA1 da7d3a7493c76b0333560b8642610c045ebc60dd
SHA256 faf26000df3d93cfb590575098e1643bf605ac34a5a7582c0d2984b90a2c3317
SHA512 19aa79ffde543e937b42c9434b66292a855ab93f45a438761c81431de5373c3376210737f5fa47258bba2854383fc4fb30f94457b9e3aa9b64b66a1ee10da796

memory/2304-14-0x0000000074B20000-0x0000000074B90000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-10 22:00

Reported

2024-08-10 22:03

Platform

win10v2004-20240802-en

Max time kernel

136s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe"

Signatures

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\takeown.exe N/A
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\takeown.exe N/A
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\ole.dll C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\imm32.dll.log C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\imm32.dll.log C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\imm32.dll C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\takeown.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\icacls.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\takeown.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4268 wrote to memory of 992 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 4268 wrote to memory of 992 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 4268 wrote to memory of 992 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\taskkill.exe
PID 4268 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 4268 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 4268 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\takeown.exe
PID 4268 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 4268 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 4268 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\icacls.exe
PID 4268 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 4268 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 4268 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\87d6480e24b5db07d96ba53333b8fcd9_JaffaCakes118.exe"

C:\Windows\SysWOW64\taskkill.exe

taskkill /F /IM NVCAgent.npc

C:\Windows\SysWOW64\takeown.exe

takeown /F C:\Windows\system32\imm32.dll

C:\Windows\SysWOW64\icacls.exe

icacls C:\Windows\system32\imm32.dll /grant administrators:f

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c c:\clr_e57ac3e.bat

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 22.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

memory/4268-9-0x0000000076510000-0x0000000076535000-memory.dmp

\??\c:\clr_e57ac3e.bat

MD5 13156545cf5e224b30d5b73e04ea6547
SHA1 446852dbb55e172483a3ecf37713a2aef27c3bc6
SHA256 92c726a2319b1a48e021dd885b80f2aa20b039b54b41c50738365cc399df46b7
SHA512 7e1a3acc7ad643699766bda1de55dab87466064cf271d7bce1a817a6f9a598fc994fc3ef6e9247855dd95f78bfb32e4e6b6c8882b8e7db784ecc4e6de99105cd