Resubmissions

08/09/2024, 13:22 UTC

240908-qmjx9azhng 10

08/09/2024, 13:18 UTC

240908-qj13cszgmd 10

Analysis

  • max time kernel
    54s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 13:22 UTC

General

  • Target

    d4735c97976979e50b382c24f1f89103_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    d4735c97976979e50b382c24f1f89103

  • SHA1

    855af19bf14866556f0b8795e3bb6c90a93809c0

  • SHA256

    b9b4468bb0e38fc053e30e93fd63a93027b5339407fb24be2cfd15f4e6accd30

  • SHA512

    ef61aaabf22ab0562e5d7a36259a3d3089b78ab38e155cfff50471b247290ea5fd515180715365469041bcc4f995894cfc15e60c2a7ae249da5050cbb7458f2b

  • SSDEEP

    1536:UVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:EnxwgxgfR/DVG7wBpE

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\smss.exe
    \SystemRoot\System32\smss.exe
    1⤵
      PID:256
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
        PID:332
      • C:\Windows\system32\wininit.exe
        wininit.exe
        1⤵
          PID:380
          • C:\Windows\system32\services.exe
            C:\Windows\system32\services.exe
            2⤵
              PID:480
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k DcomLaunch
                3⤵
                  PID:612
                  • C:\Windows\system32\wbem\wmiprvse.exe
                    C:\Windows\system32\wbem\wmiprvse.exe
                    4⤵
                      PID:304
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                      4⤵
                        PID:1244
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k RPCSS
                      3⤵
                        PID:692
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                        3⤵
                          PID:772
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                          3⤵
                            PID:820
                            • C:\Windows\system32\Dwm.exe
                              "C:\Windows\system32\Dwm.exe"
                              4⤵
                                PID:1176
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs
                              3⤵
                                PID:860
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService
                                3⤵
                                  PID:972
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k NetworkService
                                  3⤵
                                    PID:296
                                  • C:\Windows\System32\spoolsv.exe
                                    C:\Windows\System32\spoolsv.exe
                                    3⤵
                                      PID:760
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                      3⤵
                                        PID:1076
                                      • C:\Windows\system32\taskhost.exe
                                        "taskhost.exe"
                                        3⤵
                                          PID:1120
                                        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                          "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                          3⤵
                                            PID:1660
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                            3⤵
                                              PID:1304
                                            • C:\Windows\system32\sppsvc.exe
                                              C:\Windows\system32\sppsvc.exe
                                              3⤵
                                                PID:1956
                                            • C:\Windows\system32\lsass.exe
                                              C:\Windows\system32\lsass.exe
                                              2⤵
                                                PID:496
                                              • C:\Windows\system32\lsm.exe
                                                C:\Windows\system32\lsm.exe
                                                2⤵
                                                  PID:504
                                              • C:\Windows\system32\csrss.exe
                                                %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                                1⤵
                                                  PID:392
                                                • C:\Windows\system32\winlogon.exe
                                                  winlogon.exe
                                                  1⤵
                                                    PID:432
                                                  • C:\Windows\Explorer.EXE
                                                    C:\Windows\Explorer.EXE
                                                    1⤵
                                                      PID:1212
                                                      • C:\Users\Admin\AppData\Local\Temp\d4735c97976979e50b382c24f1f89103_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\d4735c97976979e50b382c24f1f89103_JaffaCakes118.exe"
                                                        2⤵
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of UnmapMainImage
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2540
                                                        • C:\Program Files (x86)\Microsoft\WaterMark.exe
                                                          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of UnmapMainImage
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2696
                                                          • C:\Windows\SysWOW64\svchost.exe
                                                            C:\Windows\system32\svchost.exe
                                                            4⤵
                                                            • Modifies WinLogon for persistence
                                                            • Drops file in System32 directory
                                                            • Drops file in Program Files directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2760
                                                          • C:\Windows\SysWOW64\svchost.exe
                                                            C:\Windows\system32\svchost.exe
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2676

                                                    Network

                                                    • flag-us
                                                      DNS
                                                      google.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      google.com
                                                      IN A
                                                      Response
                                                      google.com
                                                      IN A
                                                      172.217.169.14
                                                    • flag-us
                                                      DNS
                                                      rterybrstutnrsbberve.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      rterybrstutnrsbberve.com
                                                      IN A
                                                      Response
                                                      rterybrstutnrsbberve.com
                                                      IN A
                                                      34.253.216.9
                                                    • flag-us
                                                      DNS
                                                      erwbtkidthetcwerc.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      erwbtkidthetcwerc.com
                                                      IN A
                                                      Response
                                                      erwbtkidthetcwerc.com
                                                      IN A
                                                      34.253.216.9
                                                    • flag-us
                                                      DNS
                                                      erwbtkidthetcwerc.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      erwbtkidthetcwerc.com
                                                      IN A
                                                    • flag-us
                                                      DNS
                                                      erwbtkidthetcwerc.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      erwbtkidthetcwerc.com
                                                      IN A
                                                    • flag-us
                                                      DNS
                                                      erwbtkidthetcwerc.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      erwbtkidthetcwerc.com
                                                      IN A
                                                    • flag-us
                                                      DNS
                                                      erwbtkidthetcwerc.com
                                                      svchost.exe
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      erwbtkidthetcwerc.com
                                                      IN A
                                                    • 91.220.62.30:443
                                                      svchost.exe
                                                      152 B
                                                      3
                                                    • 172.217.169.14:80
                                                      google.com
                                                      svchost.exe
                                                      98 B
                                                      52 B
                                                      2
                                                      1
                                                    • 91.220.62.30:443
                                                      svchost.exe
                                                      152 B
                                                      3
                                                    • 34.253.216.9:443
                                                      rterybrstutnrsbberve.com
                                                      https
                                                      svchost.exe
                                                      282 B
                                                      296 B
                                                      6
                                                      7
                                                    • 34.253.216.9:443
                                                      rterybrstutnrsbberve.com
                                                      https
                                                      svchost.exe
                                                      268 B
                                                      216 B
                                                      4
                                                      5
                                                    • 34.253.216.9:443
                                                      erwbtkidthetcwerc.com
                                                      https
                                                      svchost.exe
                                                      190 B
                                                      216 B
                                                      4
                                                      5
                                                    • 34.253.216.9:443
                                                      erwbtkidthetcwerc.com
                                                      https
                                                      svchost.exe
                                                      360 B
                                                      296 B
                                                      6
                                                      7
                                                    • 8.8.8.8:53
                                                      google.com
                                                      dns
                                                      svchost.exe
                                                      56 B
                                                      72 B
                                                      1
                                                      1

                                                      DNS Request

                                                      google.com

                                                      DNS Response

                                                      172.217.169.14

                                                    • 8.8.8.8:53
                                                      rterybrstutnrsbberve.com
                                                      dns
                                                      svchost.exe
                                                      70 B
                                                      86 B
                                                      1
                                                      1

                                                      DNS Request

                                                      rterybrstutnrsbberve.com

                                                      DNS Response

                                                      34.253.216.9

                                                    • 8.8.8.8:53
                                                      erwbtkidthetcwerc.com
                                                      dns
                                                      svchost.exe
                                                      335 B
                                                      83 B
                                                      5
                                                      1

                                                      DNS Request

                                                      erwbtkidthetcwerc.com

                                                      DNS Request

                                                      erwbtkidthetcwerc.com

                                                      DNS Request

                                                      erwbtkidthetcwerc.com

                                                      DNS Request

                                                      erwbtkidthetcwerc.com

                                                      DNS Request

                                                      erwbtkidthetcwerc.com

                                                      DNS Response

                                                      34.253.216.9

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files (x86)\Microsoft\WaterMark.exe

                                                      Filesize

                                                      92KB

                                                      MD5

                                                      d4735c97976979e50b382c24f1f89103

                                                      SHA1

                                                      855af19bf14866556f0b8795e3bb6c90a93809c0

                                                      SHA256

                                                      b9b4468bb0e38fc053e30e93fd63a93027b5339407fb24be2cfd15f4e6accd30

                                                      SHA512

                                                      ef61aaabf22ab0562e5d7a36259a3d3089b78ab38e155cfff50471b247290ea5fd515180715365469041bcc4f995894cfc15e60c2a7ae249da5050cbb7458f2b

                                                    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

                                                      Filesize

                                                      197KB

                                                      MD5

                                                      9a99115df34bb119376fb18ab92533e8

                                                      SHA1

                                                      6943b8ec1cd7aa74187274a60c1550841e8ce103

                                                      SHA256

                                                      3545224c112177f6d190f26ae87327919cb7a06a65f07d4a4437054f6488659b

                                                      SHA512

                                                      a30d97d864311290b761b373ad327431928e8c9da17724333a81ff6e927764bacd8790fed8c02146f75fdfe4af013c5510dcb4c3c5ba6cdddd82a44198d8cda4

                                                    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

                                                      Filesize

                                                      193KB

                                                      MD5

                                                      9aedb37c957abe7f14dd773403c49c93

                                                      SHA1

                                                      188bacb3583bf5d9100830b70d6f55a1a3007d92

                                                      SHA256

                                                      9d36f3a24e4dea21f594173fc8d9dc68ce63e2f9e35fd744cff3cad17a96f283

                                                      SHA512

                                                      f72296f0eca577acd1f4194cbfb54cf51f0eee39ad6046cd1527d71151926f5e0552c2f5c3c8035b358ff0d3397efc69714a9e4646cd94f72e2e65c964e88e1c

                                                    • memory/2540-0-0x0000000000400000-0x0000000000431000-memory.dmp

                                                      Filesize

                                                      196KB

                                                    • memory/2540-2-0x0000000000140000-0x0000000000141000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2540-3-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2540-1-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2540-4-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2540-8-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2540-7-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2540-6-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2540-5-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2676-77-0x0000000020010000-0x000000002001B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2676-62-0x0000000020010000-0x000000002001B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2676-79-0x0000000000230000-0x0000000000231000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2676-80-0x0000000020010000-0x000000002001B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2676-81-0x0000000076F90000-0x0000000076F91000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2676-82-0x0000000020010000-0x000000002001B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2676-83-0x0000000000240000-0x0000000000241000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2676-84-0x0000000020010000-0x000000002001B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2676-73-0x0000000020010000-0x000000002001B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2696-72-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2696-588-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2696-60-0x00000000001B0000-0x00000000001B1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2696-24-0x0000000000400000-0x0000000000431000-memory.dmp

                                                      Filesize

                                                      196KB

                                                    • memory/2696-29-0x00000000001A0000-0x00000000001A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2696-78-0x0000000076F8F000-0x0000000076F90000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2696-30-0x0000000076F8F000-0x0000000076F90000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2696-28-0x0000000000400000-0x0000000000421000-memory.dmp

                                                      Filesize

                                                      132KB

                                                    • memory/2760-44-0x0000000020010000-0x0000000020022000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/2760-56-0x0000000020010000-0x0000000020022000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/2760-42-0x00000000000B0000-0x00000000000B1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2760-43-0x0000000000090000-0x0000000000091000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2760-34-0x0000000000090000-0x0000000000091000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2760-32-0x0000000020010000-0x0000000020022000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/2760-335-0x0000000020010000-0x0000000020022000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/2760-49-0x0000000020010000-0x0000000020022000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/2760-48-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2760-51-0x0000000020010000-0x0000000020022000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    We care about your privacy.

                                                    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.