Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 01:00

General

  • Target

    843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe

  • Size

    225KB

  • MD5

    843af912fff6ee44d7aaf4e9f625f509

  • SHA1

    7721563ba449f133f2592927d16c5a65da27ed19

  • SHA256

    c22c15b1fa25f120fe98f22241b86daf93addea99e92bdbb2945744b1f584d81

  • SHA512

    e1e4061e5ca54e60c9a4360f3c26aede755c0ed67e6bda998949b4eda894d14411cf65b5a2a08a0a607ce07f3df48639145ad37e3ad2c34de4636aa8efed3c65

  • SSDEEP

    6144:yNxJdew0qZfYp+cWZaKJ9VaJtPjtixbwSpMel:wJww0UfYpvi/TAPJixUSpM

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\windows\SysWOW64\net.exe
      "C:\windows\system32\net.exe" stop wscsvc
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1788
    • C:\Users\Admin\AppData\Local\Temp\frame2_276.exe
      "C:\Users\Admin\AppData\Local\Temp\frame2_276.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      PID:1764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 200
        3⤵
        • Program crash
        PID:2868
    • C:\Users\Admin\AppData\Local\Temp\liar3.exe
      "C:\Users\Admin\AppData\Local\Temp\liar3.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy /Y "C:\Users\Admin\AppData\Local\Temp\liar3.exe" C:\Windows\system32\
        3⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1488
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del /Q /F C:\Windows\temp\liar3.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1616
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v mssysif /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\system32\reg.exe delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v mssysif /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /v mssysif /d "C:\Windows\system32\liar3.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /v mssysif /d "C:\Windows\system32\liar3.exe"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2104
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c type C:\Windows\Tasks\2961475164-0020
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2016
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c type C:\Windows\Tasks\2961475164-0020
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\frame2_276.exe

    Filesize

    164KB

    MD5

    52d914c8fa26ae793b012c68291719f9

    SHA1

    71974b58f8de726790b3eadea931a73bf7bad1cd

    SHA256

    b77333164092b48615c8826ac7694f47819f070f6cc793d62363844a8c49c20f

    SHA512

    9ac6801fce8f8b49e15302932dd0198c8c0bf0e5ce7f48899081420ad774781d66d10d341e1c845252179b0caad0568a16f7b83fe109a5165976a2e95d70342e

  • \Users\Admin\AppData\Local\Temp\liar3.exe

    Filesize

    57KB

    MD5

    c75a9e75f5dc84b3d4769a29759dabee

    SHA1

    a792aab93744e9ba579564955bac31a6cbfb6d2e

    SHA256

    07f1f51821713642e753d3477f30b15c09a43fde4846a7d79dca16afe9e06c99

    SHA512

    36ffa7d59e18d8655dd187488654a77dfbbbb3cbc32328711167afb3d871f319ce5b95cdcdb01a9aaecdf88001ff427a0a2e9f41481bb07070d2dde30614147c

  • memory/1764-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1764-20-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2132-16-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/2132-36-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/2132-37-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/2416-15-0x0000000002A80000-0x0000000002ACA000-memory.dmp

    Filesize

    296KB