Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 09:06

General

  • Target

    ef780dcbdf40323e7a6601b4324f2ee2_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    ef780dcbdf40323e7a6601b4324f2ee2

  • SHA1

    eaee585ed014b36805954f1f9bbab6d884b43605

  • SHA256

    4fc065352dca3d0cce4677396669b1a9558836324bd6dcebe4439d3768bfec75

  • SHA512

    4e0e95e2553d86b7786c7c77a8ff3acdaa7dc5783c0be0f109f8cdeec94b5cb144fe7a0f6bc05a992cab5bb30ccc454d9dc5c3d42e1ae9b5f2b55daa4a0326e2

  • SSDEEP

    1536:I3SkgxVktwT7hxvbgCn7x0Vz6PGibYILO:IZgfTDcCnGOBL

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 34 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef780dcbdf40323e7a6601b4324f2ee2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef780dcbdf40323e7a6601b4324f2ee2_JaffaCakes118.exe"
    1⤵
    • Event Triggered Execution: Image File Execution Options Injection
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4652
    • C:\Windows\SysWOW64\net.exe
      net stop "Windows Firewall/Internet Connection Sharing (ICS)"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1368
    • C:\Windows\SysWOW64\net.exe
      net stop System Restore Service
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop System Restore Service
        3⤵
        • System Location Discovery: System Language Discovery
        PID:704
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3944
    • C:\Windows\SysWOW64\net.exe
      net stop "Windows Firewall/Internet Connection Sharing (ICS)"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4924
    • C:\Windows\SysWOW64\net.exe
      net stop System Restore Service
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop System Restore Service
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3728
    • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE
      C:\Users\Admin\AppData\Local\Temp\SETUP.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\_uninsep.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\_uninsep.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2640
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\NTDUBECT.EXE
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE

          Filesize

          10KB

          MD5

          73ed194861441a4a11fd8305b1e7579c

          SHA1

          24d32b00779ee78b792808048a156ce1be8e1c18

          SHA256

          b9a2ddd2da792d7796dc5195495e2839c925fad9d400a2673b4d6233e2e51ed2

          SHA512

          8c35d7baea959970850fe212f1d92e9081f65f878445f955cc07faa231449902248615e453ebd89223228f03925a4ee2a2b944bf1be077afa7d0c7c93486c1e3

        • \??\c:\_uninsep.bat

          Filesize

          128B

          MD5

          518f996fb53ecd3d3748db8708c21908

          SHA1

          4c8834441fdcb4898d9d0607e9a9dfd2477a8bfa

          SHA256

          3770f9b5c752a17164ac0a8d361b01862ab186c2732cb659ce2519280bec79d4

          SHA512

          7ac8e8066ceefebf7dfd83ce877461a45ae0b1802883ae7b319c5b756cc65a4a58814370d381ec97338a9c18f49bf7966430f6d72ff2e27d6b844a56edfab6c4

        • memory/2172-0-0x0000000010000000-0x0000000010030000-memory.dmp

          Filesize

          192KB

        • memory/2172-9-0x0000000010000000-0x0000000010030000-memory.dmp

          Filesize

          192KB