Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 01:43

General

  • Target

    eed6408824f42589f454b55a7100461a_JaffaCakes118.exe

  • Size

    201KB

  • MD5

    eed6408824f42589f454b55a7100461a

  • SHA1

    5908baefe59f508d1ca7cc54dfa9b47ee2cb0cd7

  • SHA256

    1c7876c9197afcf36d7da9b6a5ccbaf54aa6edbeb2ab18129db26b5ed3e4b394

  • SHA512

    b84c7331226f37d8f178dd3a7553f14b328c9717db17645318e9c58bd5f23ed71a8a2f661059f3fd280a578b0189e2da2fd6633db55d8e671a2a9aa321da0c1f

  • SSDEEP

    3072:s/phFZX3hy/OxIIsrurCSGsvCmUMnyWJKlwVN2ITE:sPrYUICV6mUMxJ30

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    elskerdanmark4700

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eed6408824f42589f454b55a7100461a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eed6408824f42589f454b55a7100461a_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\Facebook.plugin.emissary.exe
      C:\Users\Admin\AppData\Local\Temp\Facebook.plugin.emissary.exe
      2⤵
      • Drops file in Drivers directory
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\system32\REG.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • Modifies registry key
        PID:2736
      • C:\Windows\system32\RunDll32.exe
        RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        PID:2776
      • C:\Windows\system32\REG.exe
        REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:2288
      • C:\Windows\system32\REG.exe
        REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:2700
      • C:\Windows\system32\REG.exe
        REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:2864
      • C:\Windows\system32\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "EnableFirewall" /t REG_DWORD /d "0" /f
        3⤵
          PID:2620
        • C:\Users\Admin\AppData\Local\Temp\Bkcpy1.exe
          C:\Users\Admin\AppData\Local\Temp\Bkcpy1.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Facebook.plugin.emissary.exe

      Filesize

      201KB

      MD5

      eed6408824f42589f454b55a7100461a

      SHA1

      5908baefe59f508d1ca7cc54dfa9b47ee2cb0cd7

      SHA256

      1c7876c9197afcf36d7da9b6a5ccbaf54aa6edbeb2ab18129db26b5ed3e4b394

      SHA512

      b84c7331226f37d8f178dd3a7553f14b328c9717db17645318e9c58bd5f23ed71a8a2f661059f3fd280a578b0189e2da2fd6633db55d8e671a2a9aa321da0c1f

    • memory/2168-17-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2168-16-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2168-3-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2168-1-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2168-0-0x000007FEF536E000-0x000007FEF536F000-memory.dmp

      Filesize

      4KB

    • memory/2168-15-0x000007FEF536E000-0x000007FEF536F000-memory.dmp

      Filesize

      4KB

    • memory/2168-2-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2168-12-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-10-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-9-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-11-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-8-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-18-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-23-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2732-24-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

      Filesize

      9.6MB