Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 03:08

General

  • Target

    e196849a49e958079f7ff8608cadd6b3_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    e196849a49e958079f7ff8608cadd6b3

  • SHA1

    62cf098f491ce23296ce94e88038d9f4fe709fbc

  • SHA256

    03d84a8f3f0df0ee5c55ac71d0d0947f9cc870ab88673efa195eba021f3012fd

  • SHA512

    ce5fb6b2269714a644a85e541155e95c2f680809ca123986bcd1988714b67c33ce198ff2b4a9871c3bb1701b14d915a141544a1419b740fe7b569248a47a233e

  • SSDEEP

    24576:BcuFhCwUuqDluBMfEhJX3z5mKhwbLeoMC:HhxqDosEL3F/w+C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e196849a49e958079f7ff8608cadd6b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e196849a49e958079f7ff8608cadd6b3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\smes\u.bat"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\ProgramData\smes\smes.exe
        smes.exe -install
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
      • C:\ProgramData\smes\smes.exe
        smes.exe -start
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\temg_tmp.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2944
  • C:\ProgramData\smes\smes.exe
    C:\ProgramData\smes\smes.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\ProgramData\smes\smes.exe
      C:\ProgramData\smes\smes.exe -run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\kingsoft\kws\kws.ini

          Filesize

          720B

          MD5

          ffc3088dc68b14616fc334ce25f7c4ec

          SHA1

          83ea5e504ba582fd0db81371888b2d2d36012af8

          SHA256

          f39e009b78bbca138cf7ca72023390afe0e9ab1980eb0e326e637186a1249872

          SHA512

          b3c29e4513ba21d9588661eeffe029bdc5a2317cb3345cbe945f50df9688732d478e614e67a64f87d9cdf2c284eaeb9c497feef69ee71a621f4fc009bf1c09b4

        • C:\ProgramData\smes\KWSSVC.log

          Filesize

          202B

          MD5

          73192c0db2be12097491ff8fccea7b62

          SHA1

          b9662e97a900e1cec98a3d62831bec3c32e2a50f

          SHA256

          3aea2a7acf79c1a434b8bf6cce3efbb3afbca7d5aef5db076307ad83694c1b86

          SHA512

          00bd80f21b8c9ee7c4ea0bfea02a04892a6b49e234b16d81f1b974580d338c29646f151b86d09ea7777f478a900ae8dc9e112f27d1564d5cf2fffaf6be473abe

        • C:\ProgramData\smes\KWSSVC.log

          Filesize

          448B

          MD5

          83e6cf55c9b2921153b20838f26919da

          SHA1

          a0905fa42adbc30ecaec8af69b75cf246abb94db

          SHA256

          ba17c6c3f76e17aff573f2048c23648a9ad0692cbc4452485401e4fab49dd927

          SHA512

          6660a97e24ac18cf1c472cbd0602db73a3d9d57eb4f25a1f7850558ee97807659f29c9e6a7aff6dc64d14b103eac7cef94610a9cf050fd8facc7fc6aa927eb18

        • C:\ProgramData\smes\KWSSVC.log

          Filesize

          546B

          MD5

          557d28ae4b823923e7ed20fe055e8b91

          SHA1

          310a81d9b321a84b42baf8783ba0af98f2b6bf4e

          SHA256

          e6e4ad75cfb12312d853c1274bc2058bc00549a6613de6883fa45db71e124e79

          SHA512

          367a65aee4aca520bbdec162f50593260249b454c03b168d32e891ce0ebc0341e7317ef0a2074399b6da40c5d35abf0791834d3f3036ebb6b8d6487fe55f1e89

        • C:\ProgramData\smes\kwssp.dll

          Filesize

          425KB

          MD5

          bf5dcfd9da0514334d41cbd80d2a9138

          SHA1

          802f9e0b82edca56be08a33b2ba874b34c31f1e3

          SHA256

          f9506cf9a87aa6bfbf07f2124f2785a711b27a70839ebb95bdd4b2cf747fb060

          SHA512

          246796f2e201cde30043eaa2c0ffb4d2b3bea2bae97261a022824c31a42d2b08998b1bdcd436e8392bdd153dd6fadf9ba69361c7316a6bfda5d475678b7aa5cc

        • C:\ProgramData\smes\kwsui.dll

          Filesize

          433KB

          MD5

          45199dab51eeece95728abfe25e18f35

          SHA1

          59ab0fe25aa2adc253adbecba6862e7432df1c39

          SHA256

          a22006861cac6a849346282e2f7729deeb8f68bf29f13c15ae33d20311f77391

          SHA512

          825c6ae1f88cec3d6c469e6a15cad0430845ecc8d436777092f4c5fe8ecd02abbfeb3e2a17b2f4896b9d6e4b2d229a8b83bfdda75a3e025fc32f86610c6eef12

        • C:\ProgramData\smes\smes.exe

          Filesize

          209KB

          MD5

          1fa47f5b173cee5ef9c3ee1bda0c321e

          SHA1

          60ee40236f960affb01d569a32e1b05888bb081a

          SHA256

          b21526716068d2a8550780038e2b5ddb843d77890a07ec82ed9ce9dd0be52c64

          SHA512

          01f39376269a75510347fcf66ff2585b25d5e6e10e26b7feefa3af66e712a5f50c62bff6d40abee733e1ce965d17a2e443664838268eb7c7a2e36fc1c024224d

        • C:\ProgramData\smes\u.bat

          Filesize

          44B

          MD5

          704efba1aee1454561da552dda430498

          SHA1

          d20fb96683f769eb9cef1b0a068bcba70aeab9c2

          SHA256

          80b08d35bd27636e0774ce35ab57306f76edc6a0f7058cb1f93733cdf88bf94c

          SHA512

          7e0c9ede686238703af4893af8842c05c48ab1681ae273b32d8085cf1a17aae946c0c823a0a418787522a551d684367259ff8203ebca6e4ec69b6ded95231bd0

        • C:\Users\Admin\AppData\Local\Temp\temg_tmp.bat

          Filesize

          135B

          MD5

          407a696f787e4b0841047e41b52364e1

          SHA1

          d4ce33da8cc92201c2013c97ecbe5f8b3d09d094

          SHA256

          0bf30d45eaeaf40d9cc32b829ed2d39f83aed1336213146058b249534d685453

          SHA512

          f4eb5037cf7d077ef4f6fa6ffeec03cc78476b2954866261318d0556c4086aaa96ab89bae7a82056003de84ad84a7a711285828b32f5996d2726d6ed4d195be2

        • \ProgramData\smes\kswebshield.dll

          Filesize

          441KB

          MD5

          7851449473178f9782263d51bc5e3bbc

          SHA1

          ad5148ee1bed2348b320c62c025d52fbcbb28799

          SHA256

          c3bc7ec8428f0bb210a0597c9a0cad1be412b7fa46ea006819a3df9ac23118b4

          SHA512

          b01fc37ac84b81df8d7657000295aed7eb50aaf7f13ab2b2be9030c9f83ed1559318c83c78b4a29926d7d30e9eea9538d123ef4a649179be5a5b54ee71ed9b49

        • \Users\Admin\AppData\Local\Temp\nsoF26B.tmp\AccessControl.dll

          Filesize

          10KB

          MD5

          055f4f9260e07fc83f71877cbb7f4fad

          SHA1

          a245131af1a182de99bd74af9ff1fab17977a72f

          SHA256

          4209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc

          SHA512

          a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26

        • \Users\Admin\AppData\Local\Temp\nsoF26B.tmp\FindProcDLL.dll

          Filesize

          3KB

          MD5

          8614c450637267afacad1645e23ba24a

          SHA1

          e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

          SHA256

          0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

          SHA512

          af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

        • memory/1952-56-0x00000000002E0000-0x0000000000351000-memory.dmp

          Filesize

          452KB

        • memory/2188-5-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB