Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 00:54

General

  • Target

    ad4748d01ef07b43d3f2cb3add9da911_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    ad4748d01ef07b43d3f2cb3add9da911

  • SHA1

    e1ae4f4512d6b98c81d18d7cdf9a24dbc6d0ef0d

  • SHA256

    b4ed4637cccd997870068114c3c7d1d1cd49625620e9880a8161555b00ba2e2a

  • SHA512

    e3c10bbd7a0adcc5f58d5c286de2f49713792bae1b2269c8ac308795d5c78c54de912a3f3cd0f8965dd41f311ac8c04d3e8442e0554cc8bfbcf5450b8d0d433f

  • SSDEEP

    3072:MrMUqcZLEHGtzbPTHfEfXRp79MPcSI9SFcZtAbmy+nIdIe/:Mr1HEHwPPEhMPcSI9SFfll

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1100
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\ad4748d01ef07b43d3f2cb3add9da911_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\ad4748d01ef07b43d3f2cb3add9da911_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Windows\SysWOW64\net.exe
              net stop wscsvc
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2384
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop wscsvc
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2192
            • C:\Windows\SysWOW64\net.exe
              net stop SharedAccess
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3008
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop SharedAccess
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2012
            • C:\Users\Admin\AppData\Roaming\Raide\cyup.exe
              "C:\Users\Admin\AppData\Roaming\Raide\cyup.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1964
              • C:\Windows\SysWOW64\net.exe
                net stop wscsvc
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2860
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop wscsvc
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2844
              • C:\Windows\SysWOW64\net.exe
                net stop SharedAccess
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2736
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop SharedAccess
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2984
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp72aa8807.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:876
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1596
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2224
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1144

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

              Filesize

              2.0MB

              MD5

              23336646c8fa8e882c967872c1dda385

              SHA1

              f95f755ac046e33f1f770e3db3e7e180dd20a321

              SHA256

              0a922b020c149cb3cf8ecc03da8452f6320f538e2f81dd095625c846860cc16d

              SHA512

              2cf4933538e0420e2473017cfcf35e31771efbb3924244915d1ac4c941241830644c1d2415cafb5ac07e37c963f8332e8f4911851b80ec5a5dee5b0345200dc6

            • C:\Users\Admin\AppData\Local\Temp\tmp72aa8807.bat

              Filesize

              271B

              MD5

              8f1405fab6a26fd72c1fe68f89b3bdff

              SHA1

              01cb54519b3253411e7dd0c6fe27d0aacfe1528f

              SHA256

              ca6528fe442888e2916fa224971be290bf61687f6cb6492f4e96a7a2bce8620b

              SHA512

              e95cde94ee708dceb438876343125595c573b7fd9c795ef32de878902036470ed7be58cd0021bdd874b133e238174791b9643e6cdd2d8d9fc9c218380d1fb6cb

            • C:\Users\Admin\AppData\Roaming\Lyqu\akuk.ufo

              Filesize

              380B

              MD5

              1fa89ef7171b7fa28d28d41867fa4a4d

              SHA1

              f762848622dd9be12a04fe75a5d9b60913a25c84

              SHA256

              dbab9e770c8d744bcc1ac321048edd79b513733486bde28a6fdad247914c3d79

              SHA512

              bd70fb6085aeba5073aced8c4d137126816966dbeceba0ee4c3f447ec633652514ac7e508ebf233517ac0a91774713cd46a4b0a18e44bb263640d0dc0cefb0e5

            • C:\Users\Admin\AppData\Roaming\Raide\cyup.exe

              Filesize

              144KB

              MD5

              125a6ef05f239c9905e2631a22167e1b

              SHA1

              24cce5a0070322f26a33851f72d055d21ce87ea8

              SHA256

              737e0c13f8e1f4688bb1a1ae4061b53598babfe85b9a5c1319e12b00b1fb0df5

              SHA512

              3b91a8225653051bb26f68690ae9f9ddef1f68b3f14a813fe8b2d6ca9e78d139a2d971629e9fe572217e1023688c5eb64bc7617053c3220a67d8ef80117996b2

            • memory/1100-32-0x00000000020C0000-0x00000000020E8000-memory.dmp

              Filesize

              160KB

            • memory/1100-33-0x00000000020C0000-0x00000000020E8000-memory.dmp

              Filesize

              160KB

            • memory/1100-29-0x00000000020C0000-0x00000000020E8000-memory.dmp

              Filesize

              160KB

            • memory/1100-30-0x00000000020C0000-0x00000000020E8000-memory.dmp

              Filesize

              160KB

            • memory/1100-31-0x00000000020C0000-0x00000000020E8000-memory.dmp

              Filesize

              160KB

            • memory/1164-42-0x0000000000130000-0x0000000000158000-memory.dmp

              Filesize

              160KB

            • memory/1164-36-0x0000000000130000-0x0000000000158000-memory.dmp

              Filesize

              160KB

            • memory/1164-38-0x0000000000130000-0x0000000000158000-memory.dmp

              Filesize

              160KB

            • memory/1164-40-0x0000000000130000-0x0000000000158000-memory.dmp

              Filesize

              160KB

            • memory/1200-46-0x0000000002500000-0x0000000002528000-memory.dmp

              Filesize

              160KB

            • memory/1200-48-0x0000000002500000-0x0000000002528000-memory.dmp

              Filesize

              160KB

            • memory/1200-50-0x0000000002500000-0x0000000002528000-memory.dmp

              Filesize

              160KB

            • memory/1200-52-0x0000000002500000-0x0000000002528000-memory.dmp

              Filesize

              160KB

            • memory/1596-58-0x0000000001F80000-0x0000000001FA8000-memory.dmp

              Filesize

              160KB

            • memory/1596-56-0x0000000001F80000-0x0000000001FA8000-memory.dmp

              Filesize

              160KB

            • memory/1596-60-0x0000000001F80000-0x0000000001FA8000-memory.dmp

              Filesize

              160KB

            • memory/1596-62-0x0000000001F80000-0x0000000001FA8000-memory.dmp

              Filesize

              160KB

            • memory/1964-25-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-26-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-393-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-376-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-218-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-20-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-21-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-24-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-23-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/1964-22-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-0-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-19-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-68-0x0000000001EF0000-0x0000000001F18000-memory.dmp

              Filesize

              160KB

            • memory/2036-66-0x0000000001EF0000-0x0000000001F18000-memory.dmp

              Filesize

              160KB

            • memory/2036-74-0x0000000001EF0000-0x0000000001F18000-memory.dmp

              Filesize

              160KB

            • memory/2036-72-0x0000000001EF0000-0x0000000001F18000-memory.dmp

              Filesize

              160KB

            • memory/2036-75-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-77-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-79-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-83-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-81-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-12-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-14-0x0000000001EF0000-0x0000000001F3F000-memory.dmp

              Filesize

              316KB

            • memory/2036-70-0x0000000001EF0000-0x0000000001F18000-memory.dmp

              Filesize

              160KB

            • memory/2036-85-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-7-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-6-0x000000000040D000-0x000000000040E000-memory.dmp

              Filesize

              4KB

            • memory/2036-5-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-4-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-1-0x000000000040D000-0x000000000040E000-memory.dmp

              Filesize

              4KB

            • memory/2036-87-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-2-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-269-0x0000000001EF0000-0x0000000001F18000-memory.dmp

              Filesize

              160KB

            • memory/2036-268-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-3-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2036-89-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2036-91-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB