Analysis

  • max time kernel
    27s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 07:25

General

  • Target

    a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe

  • Size

    30KB

  • MD5

    a1a8f1991d36f230365abc97550b746d

  • SHA1

    ba95c4316be2816feb0314d054bfce6b307f5f84

  • SHA256

    e53987d0184a7bf23f65b912007e1b6377fbc2d4a8ceaae94d9ef583254191db

  • SHA512

    5798a13427178438c9c65aacd2bc61e994fe52fc3c4e2eace95d7bcb478d81a15bf547eec83f932fb2f0cc3b99a3045fe1e0ba3001f697458fd3eaf78e587456

  • SSDEEP

    768:iy/2a9hc5gJ1QeerFjCO5uS0f1bIiFqOiByB8:F/2a4UaxR5Z+iB08

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Drops file in Drivers directory 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cacls C:\Windows /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows /e /p everyone:f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2580
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c sc config ekrn start= disabled
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\sc.exe
        sc config ekrn start= disabled
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:2576
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ekrn.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ekrn.exe /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1684
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im egui.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im egui.exe /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ScanFrm.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ScanFrm.exe /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe func.dll, droqp
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
    • C:\Windows\SysWOW64\ipconfig.exe
      ipconfig /all
      2⤵
      • System Location Discovery: System Language Discovery
      • Gathers network information
      PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\func.dll

    Filesize

    36KB

    MD5

    691180351c43cee13907dc0235e18b7a

    SHA1

    60a1dd127fc2f413b66ce6413563d2a4eaf94221

    SHA256

    886581d8f51d4fbeed2eb42dfc5bd0a86101a3ff6c129adf96e02d466538d79f

    SHA512

    cae749029d9fd88602d840b126a7c0095d5adfd6b1141f38f49106172e7c38eda4bff9f3640c396c8458a10323df69ce2ee675092691a5915bcfcbb819b6a87e

  • memory/2372-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2372-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2372-9-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2372-18-0x0000000010000000-0x000000001000C000-memory.dmp

    Filesize

    48KB

  • memory/2372-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2372-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2372-9-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2372-18-0x0000000010000000-0x000000001000C000-memory.dmp

    Filesize

    48KB

  • memory/2372-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2372-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2372-9-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2372-18-0x0000000010000000-0x000000001000C000-memory.dmp

    Filesize

    48KB