Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 23:30

General

  • Target

    dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe

  • Size

    163KB

  • MD5

    dd3ce8dbf0a47cc0f8e79674e94ea0b2

  • SHA1

    d57a1fea678d6f2d90f970a18ac28cadef00e453

  • SHA256

    f1e0924d922cf0a152c235418798e6b84cba8382142b29bdeb36a6919d7c2636

  • SHA512

    41df0d9f2962f14c8b501c8e9bb2ef34f9f31d5595bdc18f5020e2f3933d9917923ad8e10b1d2781a64117b592e7ab3abd9f838719fa6219360e97ba0af5a1b2

  • SSDEEP

    3072:jD6k69gPuAyEmiuqyaq7nRkWm5yyIw2z2MYCgN5fQjJKeYphEh5oX3Ya26KLiO9:X6klmAyEmiuqFq2P5yyIw2zECYRQlKe/

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Modifies service settings 1 TTPs

    Alters the configuration of existing services.

  • Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 6 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Progra~1\%Program Files%\Dest.bat""
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\sc.exe
        sc \\10.127.1.42 create "WinAudio" binpath= "cmd.exe /c C:\PROGRA~1\%PROGR~1\Cest.bat" start= auto type= interact type= own displayname= "WinAudio"
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Windows\SysWOW64\sc.exe
        sc \\10.127.1.42 config "WinAudio" binpath= "cmd.exe /c C:\PROGRA~1\%PROGR~1\Cest.bat" start= auto type= interact type= own obj= localsystem password= ""
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:2668
      • C:\Program Files\%Program Files%\laass.exe
        "C:\Program Files\%Program Files%\laass.exe" 827.vir main
        3⤵
        • Server Software Component: Terminal Services DLL
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        PID:304
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" 827.vir main
      2⤵
      • Server Software Component: Terminal Services DLL
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2868
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\DD3CE8~1.EXE > nul & rd c:\%Progr~1 > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\%Program Files%\Dest.bat

    Filesize

    2KB

    MD5

    c3b22c388347ff02ea62ec99b1197eb5

    SHA1

    14af1545f00fb7ac5558e8210625ecead9b2f2cb

    SHA256

    6991a92b6ddbae5fc98ca9455e88fc5685ead8f3abe6b09b776fc0f6ae8f46f1

    SHA512

    d61a6ca71d05b65b7543f30394878535e36c601995ea6bf5f8f35196677fb500b4257844d22125dad082dbb2bcc63608196aef663f47892b80dcc99f470557dd

  • C:\Program Files\%Program Files%\827.vir

    Filesize

    140KB

    MD5

    9e6415b1969823662bf5f7dd7e30118d

    SHA1

    24eabc2a23edff4e7f48da13293275270d6c8e7f

    SHA256

    da92b2216eb4bb4d0b9edfaa0f690b3665b336f410d8450932cfd4161f04bb46

    SHA512

    4c820c51218adaacea3c8aad2c33b66ae9e05c04362a74bfc1d6088faa3a0c0e2cd5ca1d1392f65442727dcb1631c609802bf0b650027b7181e6f714155b85da

  • C:\Program Files\%Program Files%\laass.exe

    Filesize

    9KB

    MD5

    359c541c07a39ab11bb45aad29b2d2ce

    SHA1

    3c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7

    SHA256

    6e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5

    SHA512

    768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff

  • \??\c:\ntldr.sys

    Filesize

    73B

    MD5

    674ea842bba90c498bcbbb2a37476781

    SHA1

    6d8609760787a5f38fb04863c78dae460aceb6cb

    SHA256

    629982cae8384a2d75d058766d510e5cbeb28f649650573a2b44b3fa58ec36cc

    SHA512

    0504f3c85cf84ff612d00a8a0ddf7ac5e1577702409a5da0daf84d9569edf13e9613a9eb0b35e3014d4db76e0480cc81fba413d12427ed1ea9a721b8e563e98b

  • memory/2420-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2420-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2804-43-0x0000000000110000-0x0000000000210000-memory.dmp

    Filesize

    1024KB

  • memory/2804-42-0x0000000000110000-0x0000000000210000-memory.dmp

    Filesize

    1024KB