Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 01:53

General

  • Target

    fb46fba7ac18e7ce99020b71f4c9ec84_JaffaCakes118.exe

  • Size

    110KB

  • MD5

    fb46fba7ac18e7ce99020b71f4c9ec84

  • SHA1

    0d3c37bc1c886961652e3f732eaa9a6e07463114

  • SHA256

    205d204777afb49d6639e90caded6358619a1cc6b4fd893c61b83652ea33a8e2

  • SHA512

    a728545985246be96babdb370c7d43c94ede1112da9328d8916765cade10fdc3985a1c0aa99c44ee5962b4999499bb8de86a34bbf37ef139b344a55934abd1c8

  • SSDEEP

    1536:xV1XF99fQgtVXMWnT8YtFzii7lF/BSNL9l2xisFtVlzkAyHCVDmi:dp/LnT8YtF+ihxBSNhsisFtDyi1

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    1⤵
      PID:604
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k RPCSS
      1⤵
        PID:680
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
        1⤵
          PID:752
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
          1⤵
            PID:824
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs
            1⤵
              PID:856
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalService
              1⤵
                PID:972
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k NetworkService
                1⤵
                  PID:276
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                  1⤵
                    PID:1056
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                    1⤵
                      PID:2448
                    • C:\Users\Admin\AppData\Local\Temp\fb46fba7ac18e7ce99020b71f4c9ec84_JaffaCakes118.exe
                      "C:\Users\Admin\AppData\Local\Temp\fb46fba7ac18e7ce99020b71f4c9ec84_JaffaCakes118.exe"
                      1⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:632
                      • C:\Windows\SysWOW64\regsvr32.exe
                        "C:\Windows\system32\regsvr32.exe" /s C:\Users\Admin\AppData\Local\Temp\~~f769b94.tmp ,C:\Users\Admin\AppData\Local\Temp\fb46fba7ac18e7ce99020b71f4c9ec84_JaffaCakes118.exe
                        2⤵
                        • Deletes itself
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1148
                        • C:\Windows\SysWOW64\takeown.exe
                          takeown /f "C:\Windows\system32\rpcss.dll"
                          3⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3044
                        • C:\Windows\SysWOW64\icacls.exe
                          icacls "C:\Windows\system32\rpcss.dll" /grant administrators:F
                          3⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          • System Location Discovery: System Language Discovery
                          PID:2328
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c del %%SystemRoot%%\system32\rpcss.dll~*
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2844

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\~~f769b94.tmp

                      Filesize

                      1.0MB

                      MD5

                      43821b168664c892c277c164697fabf5

                      SHA1

                      1194ac07bb3f05504d7849fd518b2b7fb54185fa

                      SHA256

                      0a3601cdccd57ec2756b53568a24bc1270c29ea120983efd0ed4afbfe880e691

                      SHA512

                      baaf3e4543339f195a9937342dd46af89195a23f1c9cbe0f1a881089d2e85c318522c93be2a7c7507be490a8210c0874d02f7e851b093e6a07bde0263a76ea76

                    • C:\Windows\SysWOW64\apa.dll

                      Filesize

                      154B

                      MD5

                      0ec0a8c3c73e9ac749b4380405f996c6

                      SHA1

                      35c60097424f3f96fd93089e0fb2f35a91afb626

                      SHA256

                      e06911fb24c91cefd6ae7ede1996f8de7462a7816438586b92ea6060df4cdd75

                      SHA512

                      494fa8a5febeee9ebd6fca8319a3631c528630a2e0e66bbe459899f250e664f7542fada928b47ad0257ab90a3a02eeab0ed8aa6d168e9bbb9da8be2672dae145

                    • memory/604-12-0x0000000000520000-0x0000000000521000-memory.dmp

                      Filesize

                      4KB