Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 10:55

General

  • Target

    95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe

  • Size

    38KB

  • MD5

    95cdeffd369387dab772bf2a797783b8

  • SHA1

    c2ea95c172f3747a43876cac892ba838ea948baf

  • SHA256

    7a0f0a0a76596809f0645c4b53d657eba257fe139b4c09cbb2fc9e67c83aac08

  • SHA512

    d2a02a6198020628177c6811fa66e09a38628dace434a5c7371f468698d84c7f304189858a9823f9f02342293ec73e5e173b25f67496f84402f915de1b1fbe18

  • SSDEEP

    768:t4gvVrqnanuCu9zKKD6jRW2iNpThmslL5/bVaNOowJy2:zdroquCI+hwpThdTENJ72

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\drtuahehjh.exe
      C:\Windows\drtuahehjh.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1040
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:712
    • C:\Windows\SysWOW64\sc.exe
      sc config wscsvc start= DISABLED
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1000
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4272
    • C:\Windows\SysWOW64\sc.exe
      sc config SharedAccess start= DISABLED
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4428
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\drtuahehjh108.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\drtuahehjh.exe

          Filesize

          38KB

          MD5

          95cdeffd369387dab772bf2a797783b8

          SHA1

          c2ea95c172f3747a43876cac892ba838ea948baf

          SHA256

          7a0f0a0a76596809f0645c4b53d657eba257fe139b4c09cbb2fc9e67c83aac08

          SHA512

          d2a02a6198020628177c6811fa66e09a38628dace434a5c7371f468698d84c7f304189858a9823f9f02342293ec73e5e173b25f67496f84402f915de1b1fbe18

        • C:\drtuahehjh108.bat

          Filesize

          218B

          MD5

          6496650eccdd95bdce0355b58bf5b376

          SHA1

          3b5e3e335297965e9811cfb6ed8ac225be8f67ee

          SHA256

          20ef91a2979e9e35fba52405594126b61f902d7b7f5c5dc2c2beb4c87aaa62ce

          SHA512

          90ca177436acd77619a2b7fa9b72d06b1c888878da0ce8be8c4cf63ee349c7606e7cc32145794abfbfa1b9a57835329c1b6333d20702f4ed4d05c00feb966d3d

        • memory/1040-19-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/4940-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/4940-13-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB