Analysis

  • max time kernel
    2s
  • max time network
    3s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 07:09

General

  • Target

    fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe

  • Size

    398KB

  • MD5

    fbc2c420abf78cac67f0ad1b699d498a

  • SHA1

    6d8b9ca17a5c7ce312108a7a8ea36c5052bc0c05

  • SHA256

    ac4b37a2facba94ee05030e6ef3a0898b6078a96bbb798ae9c1e6d075827beb2

  • SHA512

    8a131e3bc8d86c9a97c7b749eea520561a92d05a2c7fb02f18facf9be246ad508ba1a73b0ea1779573a800c336b3c3a8265e6532fefa473756d2fcb15f25a569

  • SSDEEP

    12288:0BZHH6OfVl9JvtJ5mVicCocaC+jbDEdzknOhzEvboE:8aOdltJ5mVqMlbarhgvsE

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 38 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\cb.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\cb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\1EuroP.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\1EuroP.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2796
    • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\2IC.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\2IC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:596
    • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\3E4U - Bucks.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\3E4U - Bucks.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\6tbp.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\6tbp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\ondlat.dll",Startup
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:856
    • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\IR.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\IR.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Security Center"
        3⤵
          PID:1480
        • C:\Windows\SysWOW64\sc.exe
          sc config wscsvc start= DISABLED
          3⤵
          • Launches sc.exe
          PID:2584
        • C:\Windows\SysWOW64\net.exe
          net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
          3⤵
            PID:2024
          • C:\Windows\SysWOW64\sc.exe
            sc config SharedAccess start= DISABLED
            3⤵
            • Launches sc.exe
            PID:1880
          • C:\Users\Admin\AppData\Roaming\7bsxzxl.exe
            C:\Users\Admin\AppData\Roaming\7bsxzxl.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1920
          • C:\Windows\SysWOW64\Rundll32.exe
            Rundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf
            3⤵
              PID:1100
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Users\Admin\AppData\Roaming\80e81bi6.bat
              3⤵
                PID:2300

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\IR.exe

            Filesize

            61KB

            MD5

            b4060ce0c8f8a3bad7a63b9fa95c1464

            SHA1

            f77bb4306747258219f2b97693d62eedc438ccae

            SHA256

            cd964af4e62c9007c4aaedd9ccab5cf84a78b51e11332ded2b591c81b23872d6

            SHA512

            35eb45b85f3166a5f007465911e04669e8182df1cf23815ab109868507c95479561950faf918afe8d3664a6f0f04492d6742b74369d7e85f1090f964ecb9544e

          • C:\Users\Admin\AppData\Roaming\80e81bi6.bat

            Filesize

            154B

            MD5

            2561161141dd563d0442abc4537e43c5

            SHA1

            b8ee9873152ed080e6c9cffca2c1ae70e5bd20d8

            SHA256

            6ea0e7f01c74c94f9d58283744fab2561d7ab8e727b8d14159dbb6dce5ac8d56

            SHA512

            2a5cf9be7c427928c6ba750b2fad59bd8b1c8c698b687b89c3d60d1c44441f28938065fb9455bd7fe0104835e67184ebfc55dd5e7231a09dfd26b36896c35637

          • \Users\Admin\AppData\Local\Temp\nsjC979.tmp\1EuroP.exe

            Filesize

            75KB

            MD5

            87fb5442c7843acf787ea54f50d27ef3

            SHA1

            e2c0bc89abdf1cc14f030633b8520fa488c2ee7c

            SHA256

            40abf4fe2142f94b0a9b6ebf933423b47a975b4b6a67332545e9dc7afcfbd1e2

            SHA512

            09307d21725976717bd162c019ffccd3f7667eee0506de009df99ce52d220b56452530df51275638a5298ac11ca6ab3b11ce29270e5f8b66c8547f34c407488c

          • \Users\Admin\AppData\Local\Temp\nsjC979.tmp\2IC.exe

            Filesize

            168KB

            MD5

            84d7956209c39cde3b9b02d1b6c64113

            SHA1

            9feb8cb82f178be3180d033d9b1715b0d5114c58

            SHA256

            28e120376e926940dc45f8cc2f9193457bf8b89671901453d30e996ca617a29a

            SHA512

            03a55ad0b5ec4913b3a53b6cb67afbf661c0321a6e059a6e01272c9e7fc10935c2f9297640d905eeb3d00a1b5154269052be4b6bf74627c3577722ea7c91ee18

          • \Users\Admin\AppData\Local\Temp\nsjC979.tmp\3E4U - Bucks.exe

            Filesize

            29KB

            MD5

            bc1e9eefab202aa96ca36e2de9e0d167

            SHA1

            2a7f254e2ede629db228f95075eaa9c74f5f7586

            SHA256

            e5775cc832c611d33bae42484d318e62b374fcf8786f11d5ae8087e5fb6d011f

            SHA512

            8e8c00acae442246de1aaf821d7f0a5a3d77c64f3946ad48caebdf841b790472be2f4bdc6027103ca695f10101869382e5a43aec023164d0fac136bb8528a773

          • \Users\Admin\AppData\Local\Temp\nsjC979.tmp\6tbp.exe

            Filesize

            112KB

            MD5

            e9f63abc82ffabfaa4c325da1554af7c

            SHA1

            9bd51f5695225f7a13a44a03d0eac2b1339dab5f

            SHA256

            7ff56015fd3fe7ccec00eb198318d8647c0c3386974f1889abc632a55ceafa80

            SHA512

            2721a5cdae7c0a066defe65b7e9e4f15bab7b0ffbffe0eb72e2c3d21c0f2fe547def37df3ec1c7ccdae7a89383d9514d44f386e0c0ab8f14b69c666f9c8b8ee2

          • \Users\Admin\AppData\Local\Temp\nsjC979.tmp\cb.exe

            Filesize

            3KB

            MD5

            46e07fd3a40760fda18cf6b4fc691742

            SHA1

            53ee1a754bf5e94fa88a6ab8bb6120b4011afcfa

            SHA256

            bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be

            SHA512

            ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd

          • \Users\Admin\AppData\Local\ondlat.dll

            Filesize

            112KB

            MD5

            7131c18f90b51938fbe7f4e5744a82b6

            SHA1

            3c69d3e7b45bd4a6d2aaf8096a6448b93fd4f550

            SHA256

            0fff9ca615a9371402721e8b3a4c99ef846bff7e5e663b764660edae138f5fa7

            SHA512

            dc982b471b0bc27e5358bb5ca3fa948a76d407251f66c040e8499a07e104f41d53a85db398b6bf2e709347dda55dee062005adfd2bc19263051a05ef0382135b

          • memory/856-91-0x0000000010000000-0x000000001001C000-memory.dmp

            Filesize

            112KB

          • memory/1920-100-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1920-106-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2660-75-0x00000000001C0000-0x00000000001F0000-memory.dmp

            Filesize

            192KB

          • memory/2660-76-0x00000000001C0000-0x00000000001F0000-memory.dmp

            Filesize

            192KB

          • memory/2660-70-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2660-119-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2724-82-0x0000000010000000-0x000000001001C000-memory.dmp

            Filesize

            112KB