Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 00:22

General

  • Target

    8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe

  • Size

    412KB

  • MD5

    8c959ce0c4d5f14751bf85bfd81b214b

  • SHA1

    61bd188d4c4fbad361e209c9ce107a710035b6c5

  • SHA256

    8894e0f387acf167b269af0578698d00887f26ed11eb4a17d818b5a03b01bdb7

  • SHA512

    5d3983ddaf84eed401d6b2bb075e1b32ecaec93664681747b62621bc4bdeb9640e39d176d3a4c67374988f661d49e7bd3de443d75eca9a05deafed4bdbf4c47b

  • SSDEEP

    6144:mrlZ/xSAeSIehcDTfWWA1YkJdro64g56u5BIeu5woseBn0hqFL1BDc:a/A9SIeqT+W6E63MiIeIRqhuL1BD

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2884
        • C:\Users\Admin\AppData\Roaming\lsass.exe
          /d C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Users\Admin\AppData\Roaming\lsass.exe
            /d C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Users\Admin\AppData\Roaming\lsass.exe
              /d C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
              6⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\lsass.exe

    Filesize

    412KB

    MD5

    96e28176efe3d9f1b7acb94ff71abd73

    SHA1

    a42272c59a6a56490301356ab3f4aea4a4cbe09d

    SHA256

    fc76f086aadf8d9df5ab2f8bb875c9036d71f8efe6b4fcbb555b6e023f998e79

    SHA512

    a05d7ebd4e026d41f4c67d288b9efabf6424e571973e95af146d763a7ef0761457f211b513ca478e7c8499092b66b3ba3867d34cde3c51a96d9fd585533defe7

  • memory/2052-18-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2052-47-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2052-20-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2052-22-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2052-29-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2124-14-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-17-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-2-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-33-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-12-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2124-6-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2124-4-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2740-86-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-89-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-90-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-91-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-92-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-93-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-94-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2944-68-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2944-87-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB