Analysis

  • max time kernel
    52s
  • max time network
    55s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 17:15

Errors

Reason
Machine shutdown

General

  • Target

    b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe

  • Size

    154KB

  • MD5

    b453d40f223cf35624a5adc36c40fd39

  • SHA1

    194f6a9df8de4d8f26e0f3b10d64a850b43880a7

  • SHA256

    2091da27bcd28527d5c5afa71156c080ed7299af87ddd8b703f9935cd51d8e73

  • SHA512

    a76190f34d7868e834fae148703d8e7534f2886e24fbe6952acb6a59d36735b902f7da02b85883b86c349fc012ae711be195e137198f08d081bf99dd272cbee7

  • SSDEEP

    3072:qLsZ54aDdodEjH5CXJ8lochRroyMD5SnD4Thtov4BXZcM5ubSuFxeDn:qgPDdodEjZLL5oyRwhtovGpcM5ES2QD

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry key 1 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:4916
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\wscsvc /v Start /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\wscsvc /v Start /t REG_DWORD /d 0 /f
        3⤵
        • Modifies security service
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:3016
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k taskkill /IM avgrsx.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /IM avgrsx.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avgg /t REG_SZ /d C:\Intern\avgMonitor.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avgg /t REG_SZ /d C:\Intern\avgMonitor.exe /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:740
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avat /t REG_SZ /d C:\Intern\avasts!.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avat /t REG_SZ /d C:\Intern\avasts!.exe /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:4904
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:3108
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:3820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\System32\cmd.exe /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4980
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4744
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v load /t REG_SZ /d C:\Intern\firewalls.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v load /t REG_SZ /d C:\Intern\firewalls.exe /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:4432
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k date 01/01/2016
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:828
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k shutdown -r -f -t 5 -c "."
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown -r -f -t 5 -c "."
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1104
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3977055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4000-0-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4000-1-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/4000-2-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4000-4-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/4000-9-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB