Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 06:11

General

  • Target

    dbf56ee3e6aac2e967ca25d1265063cb_JaffaCakes118.exe

  • Size

    35KB

  • MD5

    dbf56ee3e6aac2e967ca25d1265063cb

  • SHA1

    4656ac7c7244de9fe8ad95e2aa40a3aae6a70775

  • SHA256

    0ce36021731a718190f970769d0bc51e74268f7bc907c1a7251c0cb05336cf66

  • SHA512

    7ba76f35ec12394f08987c2a7897d3f0d64fc0d8f05edaca21cffe28768863e03809526159bc5aef9ce2004fad618c4b8f7adbad7b6910b6e527b34423f4e652

  • SSDEEP

    768:1yZaKiQO/wls1dzo7T9DRWPx8p2SivRLAfzb8ZCT:c/O/wl6kRRSJpLALgZc

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 10 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 6 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbf56ee3e6aac2e967ca25d1265063cb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbf56ee3e6aac2e967ca25d1265063cb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\net.exe
      net stop cryptsvc
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop cryptsvc
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2748
    • C:\Windows\SysWOW64\sc.exe
      sc config cryptsvc start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2200
    • C:\Windows\SysWOW64\sc.exe
      sc delete cryptsvc
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2136
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Users\Admin\AppData\Local\Temp\1726121503.dat, ServerMain c:\users\admin\appdata\local\temp\dbf56ee3e6aac2e967ca25d1265063cb_jaffacakes118.exe
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DVR0034017.dll

    Filesize

    32KB

    MD5

    14f3e5abf37494b9f9e3c63d863f225b

    SHA1

    041a026d5f1e81f25f88756c095aeb71e7162ee8

    SHA256

    d27d3c1028891e0373485fe498ecb6b2f37f3486057452deb88e41fb71cf58a0

    SHA512

    5a1f1813f9fd8cfb4bda8648cd0acb9d5e3f84aad7847b87827f96b125c52f49b7c2238ba8249aaa5e34b4cf7be6bef7495ebb0f8dddc6f2eeec7a09f2b23f32

  • C:\Windows\SysWOW64\yuksuser.dll

    Filesize

    4KB

    MD5

    9c67f6bbda3881cfd02095160cf91576

    SHA1

    80de7475e91692dc5bead2cac98f74c1073cd93e

    SHA256

    6ce97c6f0ad8be183de935a7aab7d46821e8de9e55a4bff54acb49d056826a94

    SHA512

    eebbd6d0d4f50fbb8ee9e9a7976d06fb6796cce657187c8a1254ca1cf5040ec39cc5b4faed6a8bf79d38e051c9de46b87c38e2318704ae4bef2c2a50e06004d2

  • \Windows\SysWOW64\chinasougou.ime

    Filesize

    8KB

    MD5

    251224cd16c7d500b103cdc6c0e6fc62

    SHA1

    5fdaa016efccc9ff6a2f41800a006f1adc606944

    SHA256

    666e8c00cf310cfd2a29088039ab14e0f18cc77b472b812f03a9a563bba221a8

    SHA512

    8d063bf5fed1f5b9c3f8fd56f7ef1a54fb671b5ae8e92dcfc751eac71cb895a69e7e38abe0e0ce3ea3bd4c4bb2f3ef329ca208b1d5235a5fa2f7515fbb47a053

  • memory/2340-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2340-20-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB