Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
15-09-2024 19:31
Behavioral task
behavioral1
Sample
e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118
-
Size
1.1MB
-
MD5
e33d0c06bb431b3e421ef4b5b9327197
-
SHA1
cfdd11cd560b4867cf1124f5baa64ea35e604ebf
-
SHA256
617efd09ffd19d1f70a0f9b3aed510ad76f5d8d4667176335350c9553c23dc6a
-
SHA512
007bd45140f374b5c1bbd0b851a8b9b28fb7cf0bbb9accea5052daa388c6289b3c980d1e07539818bfe9d10af0872e8ca855ebfd5cea8f3b3a130017ecff8880
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaMI+gIGYuuCol7r:4vREKfPqVE5jKsfaMRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodshchmodshchmodshchmodpid Process 1634 sh 1635 chmod 1642 sh 1643 chmod 1649 sh 1650 chmod 1655 sh 1656 chmod -
Executes dropped EXE 2 IoCs
Processes:
receioracleioc pid Process /usr/bin/bsd-port/recei 1597 recei /usr/bin/oracle 1605 oracle -
Processes:
e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118receidescription ioc Process File opened for modification /etc/init.d/VsystemsshMmt e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /etc/init.d/selinux recei -
Write file to user bin folder 9 IoCs
Processes:
e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118cpcpreceicpcpcpcpdescription ioc Process File opened for modification /usr/bin/bsd-port/recei.conf e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /usr/bin/bsd-port/recei cp File opened for modification /usr/bin/oracle cp File opened for modification /usr/bin/bsd-port/recei.conf recei File opened for modification /usr/bin/bsd-port/udevd.conf e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp -
Writes file to system bin folder 2 IoCs
Processes:
cpcpdescription ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118receidescription ioc Process File opened for reading /proc/cpuinfo e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for reading /proc/cpuinfo recei -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118receidescription ioc Process File opened for reading /proc/net/dev e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for reading /proc/net/dev recei -
Processes:
receimkdirinsmode33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118cporaclecpmkdirinsmodcpmkdircpcpmkdircpmkdircpmkdirmkdircpdescription ioc Process File opened for reading /proc/sys/kernel/version recei File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version oracle File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat recei File opened for reading /proc/meminfo recei -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
Processes:
oraclee33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118description ioc Process File opened for modification /tmp/Dest.cfg oracle File opened for modification /tmp/appd.log e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /tmp/appd.conf e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /tmp/Dest.cfg e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /tmp/notify.file e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 File opened for modification /tmp/appd.log oracle File opened for modification /tmp/notify.file oracle
Processes
-
/tmp/e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118/tmp/e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes1181⤵
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1569 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt"2⤵PID:1581
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt3⤵PID:1582
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt"2⤵PID:1583
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt3⤵PID:1584
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt"2⤵PID:1585
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt3⤵PID:1586
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt"2⤵PID:1587
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt3⤵PID:1588
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt"2⤵PID:1589
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt3⤵PID:1590
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1591
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1592
-
-
-
/bin/shsh -c "cp -f /tmp/e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 /usr/bin/bsd-port/recei"2⤵PID:1593
-
/usr/bin/cpcp -f /tmp/e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 /usr/bin/bsd-port/recei3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1594
-
-
-
/bin/shsh -c /usr/bin/bsd-port/recei2⤵PID:1596
-
/usr/bin/bsd-port/recei/usr/bin/bsd-port/recei3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1597 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1613
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1614
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1615
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1616
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1617
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1618
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1619
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1620
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1621
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1622
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1624
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1625
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1626
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1627
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1629
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1630
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /bin/lsof"4⤵PID:1631
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1632
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1634 -
/usr/bin/chmodchmod 0755 /bin/lsof5⤵
- File and Directory Permissions Modification
PID:1635
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1636
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1637
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1638
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1639
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /bin/ps"4⤵PID:1640
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1641
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵
- File and Directory Permissions Modification
PID:1642 -
/usr/bin/chmodchmod 0755 /bin/ps5⤵
- File and Directory Permissions Modification
PID:1643
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1644
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1645
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /usr/bin/lsof"4⤵PID:1646
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1647
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1649 -
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵
- File and Directory Permissions Modification
PID:1650
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1651
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1652
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /usr/bin/ps"4⤵PID:1653
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1654
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵
- File and Directory Permissions Modification
PID:1655 -
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵
- File and Directory Permissions Modification
PID:1656
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1657
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1658
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1599
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1600
-
-
-
/bin/shsh -c "cp -f /tmp/e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 /usr/bin/oracle"2⤵PID:1601
-
/usr/bin/cpcp -f /tmp/e33d0c06bb431b3e421ef4b5b9327197_JaffaCakes118 /usr/bin/oracle3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1602
-
-
-
/bin/shsh -c /usr/bin/oracle2⤵PID:1604
-
/usr/bin/oracle/usr/bin/oracle3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1605
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1607
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1608
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD507fb6b9592e84446db8ca421087302ab
SHA11902a52ad702681a78c2674e9932000742d4f323
SHA2566f1c278045ebd6e253bb6a431efd4d0233f055cf51dc3adae5f01d3289403e29
SHA5121886c5404ab547048045c357ed65e3a2f97dcd3ddea0bc3e8a5269f5320e9c1ced8753d6e69aa0e7f93f1653231edc19aaf80805035969043c77fbcef4a374b4
-
Filesize
36B
MD557cde9c165195cfb90c212057795ed49
SHA1d77d9895306eb09ad9b54588fb7998c79c671563
SHA2563e3488e9c63dfadffd594301e2192418b158238bfb8f83d6702123d72892cf36
SHA512de9af53a508167cbbb820a99c2742918ec5b8c83877b77e43e4b441019311685647f47fb4666ba53ecef4e6a2d5514eb67981d471ddf173b04848609b3c0c00d
-
Filesize
4B
MD57949e456002b28988d38185bd30e77fd
SHA18eac9d03673ad3fa86c1c815275470ec81580e0a
SHA2563a481e728390d89c6843c180dc18ca8d693de5f5421e6240711c5dad483c72b3
SHA51286ffa374c2572cf61c670ec5469b80a9f71db097a87e45393aac98ac96a1c019325f360ccbaa6509acd366045c871b0e2ce76503942603228cf87b5c18105586
-
Filesize
51B
MD53bce2b4909160b413ace66e0ecc314e1
SHA183151d0ed5b8d8fa72d9e53f286e8bce9e7700d9
SHA256279ed2ad71d5879edbdd25d9de4fec7b98d9a3077dc1892268d1b3d1fd3e0343
SHA512bc7d26c0b80c8dfdf4a770a718076e936d2f4936930324736a09a874ec7bf1368705152a6218189161b0cba703e36d4bc40e58a18fa89770d953d54e5f9c4d91
-
Filesize
1.1MB
MD5e33d0c06bb431b3e421ef4b5b9327197
SHA1cfdd11cd560b4867cf1124f5baa64ea35e604ebf
SHA256617efd09ffd19d1f70a0f9b3aed510ad76f5d8d4667176335350c9553c23dc6a
SHA512007bd45140f374b5c1bbd0b851a8b9b28fb7cf0bbb9accea5052daa388c6289b3c980d1e07539818bfe9d10af0872e8ca855ebfd5cea8f3b3a130017ecff8880
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de