Analysis

  • max time kernel
    138s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:21

General

  • Target

    ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118.exe

  • Size

    219KB

  • MD5

    ea93035d6b00148b21b5b1f64f2db9ac

  • SHA1

    45852452126a743a0ad2f49b224618f8fe044eff

  • SHA256

    c23b564b7a2e2991d9268a2aea47f1f8a74deced10d70bfe38077d10793bf8eb

  • SHA512

    6c9f21481368c25e34efac4fd08818dcce99990a83f324ba6731e3cd28a69352989f6da9b3a5ffedc77e348ff21df5b4a9641f812709fcde092920dedb12b8c9

  • SSDEEP

    6144:Rm2OXHGn0zttJzx0bk+n2R5NoubeP6PFj52uZ1+4PgKD:RcXmat/AznY5Nc6CuZJPga

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:332
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:852
    • C:\Windows\system32\wbem\WMIADAP.EXE
      wmiadap.exe /F /T /R
      2⤵
        PID:2944
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          3⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system32\consrv.dll

      Filesize

      52KB

      MD5

      6bf2039986af96d98e08824ac6c383fd

      SHA1

      0bb6384656a96943cb427baa92446f987219a02e

      SHA256

      a3e03454ff636f4cdd0a95b856ea9e7857cd3ce0fd2bc6d528ab45781349103f

      SHA512

      fae378badcd6b45d69705d11fe5feb2d9f93fa444249c13aff9b150359ffdbcfe2b160731e193d3e19b6eef18d2ef01de41549a1c2bbdf59501f901511f9068e

    • \??\globalroot\systemroot\assembly\temp\@

      Filesize

      2KB

      MD5

      08f27d2a8eb6d5ed7d45994ae4d731fb

      SHA1

      8d251611971e6d1f6e2c47a54fda61624cc6ceea

      SHA256

      a54fce088510895c3ce5089e49fcf6f091cdd6eaa8e0fd6697a4539f0c72492a

      SHA512

      7071190a6e1599bef363681bd0454d67471baa52310bfef19809f014da82f04ecb961f7d493662d690b2c0608ff465410811450b250f81bb58b3cd0bedacbc76

    • memory/332-30-0x0000000000C50000-0x0000000000C61000-memory.dmp

      Filesize

      68KB

    • memory/332-18-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

      Filesize

      4KB

    • memory/332-20-0x0000000000C50000-0x0000000000C61000-memory.dmp

      Filesize

      68KB

    • memory/332-21-0x0000000000C50000-0x0000000000C61000-memory.dmp

      Filesize

      68KB

    • memory/852-42-0x0000000000430000-0x000000000043B000-memory.dmp

      Filesize

      44KB

    • memory/852-32-0x0000000000420000-0x000000000042B000-memory.dmp

      Filesize

      44KB

    • memory/852-45-0x0000000000430000-0x000000000043B000-memory.dmp

      Filesize

      44KB

    • memory/852-36-0x0000000000420000-0x000000000042B000-memory.dmp

      Filesize

      44KB

    • memory/852-40-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/852-41-0x0000000000420000-0x000000000042B000-memory.dmp

      Filesize

      44KB

    • memory/1204-5-0x0000000002510000-0x0000000002516000-memory.dmp

      Filesize

      24KB

    • memory/1204-4-0x0000000002500000-0x0000000002502000-memory.dmp

      Filesize

      8KB

    • memory/1204-13-0x0000000002510000-0x0000000002516000-memory.dmp

      Filesize

      24KB

    • memory/1204-9-0x0000000002510000-0x0000000002516000-memory.dmp

      Filesize

      24KB

    • memory/1304-25-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1304-29-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1304-0-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/1304-24-0x0000000000414000-0x0000000000418000-memory.dmp

      Filesize

      16KB

    • memory/1304-3-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1304-2-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1304-1-0x0000000000414000-0x0000000000418000-memory.dmp

      Filesize

      16KB