Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 12:23

General

  • Target

    da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe

  • Size

    450KB

  • MD5

    da5782bac1920b593c0901a2e762955f

  • SHA1

    5aa3fc83939b7292286a68fb31ab996d2e08abb3

  • SHA256

    6a7629916cbf80c851ef346c1198b6bb6fc572892931f22130cc278a200b29b6

  • SHA512

    09442aa6b5e739052670a974795a234e8118770a83ac404fd673db146d53aa9a0c35b9cf355f8a1dfe1d47b3adf68b9fda95008d22abedd2e0d60efbcbdfd628

  • SSDEEP

    6144:5aqKTRNjxQ1XUffZ5Lm771lTrnjeZPpePqt+DHv3cyvdkt/ft+UXnjrPFNpV37d/:5OtVx+EffZweJSvM6iNX/FvJ7Q8iztdo

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 10 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\ProgramData\лпорпароаыв.exe
      "C:\ProgramData\лпорпароаыв.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Windows\system32\sc.exe
          sc stop WinDefend
          4⤵
          • Launches sc.exe
          PID:2700
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc delete WinDefend
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\system32\sc.exe
          sc delete WinDefend
          4⤵
          • Launches sc.exe
          PID:2732
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableRealtimeMonitoring $true
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2872
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBehaviorMonitoring $true
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableBehaviorMonitoring $true
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2708
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBlockAtFirstSeen $true
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableBlockAtFirstSeen $true
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2916
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIOAVProtection $true
        3⤵
          PID:2820
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Set-MpPreference -DisableIOAVProtection $true
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2592
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisablePrivacyMode $true
          3⤵
            PID:2740
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Set-MpPreference -DisablePrivacyMode $true
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2016
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIntrusionPreventionSystem $true
            3⤵
              PID:2596
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Set-MpPreference -DisableIntrusionPreventionSystem $true
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2124
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -SevereThreatDefaultAction 6
              3⤵
                PID:2624
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Set-MpPreference -SevereThreatDefaultAction 6
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:344
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -LowThreatDefaultAction 6
                3⤵
                  PID:2768
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Set-MpPreference -LowThreatDefaultAction 6
                    4⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1920
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -ModerateThreatDefaultAction 6
                  3⤵
                    PID:2756
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Set-MpPreference -ModerateThreatDefaultAction 6
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1712
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableScriptScanning $true
                    3⤵
                      PID:2636
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell Set-MpPreference -DisableScriptScanning $true
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1924
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe
                      3⤵
                        PID:1616
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {AB5F7EA8-BA70-4C6A-AA71-BC624D23E2F6} S-1-5-18:NT AUTHORITY\System:Service:
                    1⤵
                      PID:2388
                      • C:\Users\Admin\AppData\Roaming\mslibrary\лпорпароаыв.exe
                        C:\Users\Admin\AppData\Roaming\mslibrary\лпорпароаыв.exe
                        2⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Modifies data under HKEY_USERS
                        PID:2400
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
                          3⤵
                            PID:2512
                            • C:\Windows\system32\sc.exe
                              sc stop WinDefend
                              4⤵
                              • Launches sc.exe
                              PID:1580
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c sc delete WinDefend
                            3⤵
                              PID:1868
                              • C:\Windows\system32\sc.exe
                                sc delete WinDefend
                                4⤵
                                • Launches sc.exe
                                PID:3012
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                              3⤵
                                PID:1556
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                  4⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2804
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBehaviorMonitoring $true
                                3⤵
                                  PID:1584
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell Set-MpPreference -DisableBehaviorMonitoring $true
                                    4⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Drops file in System32 directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1984
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBlockAtFirstSeen $true
                                  3⤵
                                    PID:2104
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell Set-MpPreference -DisableBlockAtFirstSeen $true
                                      4⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:756
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIOAVProtection $true
                                    3⤵
                                      PID:2980
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell Set-MpPreference -DisableIOAVProtection $true
                                        4⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:288
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisablePrivacyMode $true
                                      3⤵
                                        PID:2404
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Set-MpPreference -DisablePrivacyMode $true
                                          4⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1996
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIntrusionPreventionSystem $true
                                        3⤵
                                          PID:2744
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true
                                            4⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Drops file in System32 directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1952
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -SevereThreatDefaultAction 6
                                          3⤵
                                            PID:3056
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Set-MpPreference -SevereThreatDefaultAction 6
                                              4⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2652
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -LowThreatDefaultAction 6
                                            3⤵
                                              PID:2732
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell Set-MpPreference -LowThreatDefaultAction 6
                                                4⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Drops file in System32 directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1140
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -ModerateThreatDefaultAction 6
                                              3⤵
                                                PID:2408
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Set-MpPreference -ModerateThreatDefaultAction 6
                                                  4⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops file in System32 directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1476
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableScriptScanning $true
                                                3⤵
                                                  PID:2604
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell Set-MpPreference -DisableScriptScanning $true
                                                    4⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Drops file in System32 directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3004
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2664

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\ProgramData\лпорпароаыв.exe

                                              Filesize

                                              450KB

                                              MD5

                                              da5782bac1920b593c0901a2e762955f

                                              SHA1

                                              5aa3fc83939b7292286a68fb31ab996d2e08abb3

                                              SHA256

                                              6a7629916cbf80c851ef346c1198b6bb6fc572892931f22130cc278a200b29b6

                                              SHA512

                                              09442aa6b5e739052670a974795a234e8118770a83ac404fd673db146d53aa9a0c35b9cf355f8a1dfe1d47b3adf68b9fda95008d22abedd2e0d60efbcbdfd628

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              9f8a77c26c012493562e57b1efb0ece0

                                              SHA1

                                              8c2382b7c41c6b6dce29b3b23268d33299542163

                                              SHA256

                                              dcf9c0afb236d5c6754e8b21f698ff70aad2455f77f034677a6a1ba53a699c69

                                              SHA512

                                              f17f7da60bd0ab135682a6ddd4c404432fc92aa9ea5395565986be96351c9aaf9ad4c46fa03b3b670f80ff165f6f1f015639a47730a841d3abea26c5cc4333a6

                                            • memory/1616-66-0x0000000010000000-0x000000001001E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/2412-8-0x0000000001D30000-0x0000000001D5C000-memory.dmp

                                              Filesize

                                              176KB

                                            • memory/2412-67-0x0000000001D30000-0x0000000001D5C000-memory.dmp

                                              Filesize

                                              176KB

                                            • memory/2412-61-0x0000000010000000-0x0000000010007000-memory.dmp

                                              Filesize

                                              28KB

                                            • memory/2592-29-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/2664-78-0x0000000010000000-0x000000001001E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/2708-28-0x000000001B5B0000-0x000000001B892000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/2804-73-0x0000000000D20000-0x0000000000D28000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/2804-72-0x0000000019EA0000-0x000000001A182000-memory.dmp

                                              Filesize

                                              2.9MB