Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 17:05

General

  • Target

    fcc165cc8486f520735036749247347a_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    fcc165cc8486f520735036749247347a

  • SHA1

    d2dee39dfa9e0b3c2ba6d9765d15f02d9708c454

  • SHA256

    fc5499f9f9c4cd88af47e503db6acf4e7d6bd4f0bcf4e2dce1e9c395e3a84878

  • SHA512

    30b74afb2073b75ef949e9bbe7749f1294499769b55da37b3e9ce78c024ec56817fb444cd086ab52fa60f3dc9b326c9cd97d97096eb4a11bd7f2efa686609e7c

  • SSDEEP

    3072:8wyY4UqK3sx05cZ6g3BfQQ7cZuXlhEPG25QU/:5RyK3/5UpfQmflhEPG2u

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcc165cc8486f520735036749247347a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fcc165cc8486f520735036749247347a_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\\tgi.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram name="tgi" program="C:\Windows\system32\svchost.exe" mode=enable
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3000
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add portopening tcp 8085 tgi enable
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2708
      • C:\Windows\SysWOW64\sc.exe
        sc create "ttgi" type= share start= auto binpath= "C:\Windows\system32\svchost.exe -k ttgi"
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:3560
      • C:\Windows\SysWOW64\reg.exe
        reg add "hklm\system\currentcontrolset\services\ttgi\parameters" /v servicedll /t reg_expand_sz /d "C:\Windows\system32\tgi.dll" /f
        3⤵
        • Server Software Component: Terminal Services DLL
        • System Location Discovery: System Language Discovery
        PID:3600
      • C:\Windows\SysWOW64\reg.exe
        reg add "hklm\system\currentcontrolset\services\ttgi" /v failureactions /t reg_binary /d 00000000000000000000000003000000140000000100000060ea00000100000060ea00000100000060ea0000 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4088
      • C:\Windows\SysWOW64\reg.exe
        reg add "hklm\software\microsoft\windows nt\currentversion\svchost" /v ttgi /t reg_multi_sz /d "ttgi\0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:692
      • C:\Windows\SysWOW64\sc.exe
        sc start ttgi
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:3016
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k ttgi -s ttgi
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    PID:3812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tgi.bat

    Filesize

    683B

    MD5

    d1964040dfa5765c66b726a38bb50db9

    SHA1

    76bf7b53f7fa1b654b43ba9c7896175360dc3d82

    SHA256

    fa5765c5e959d1083c73aae0022ac76ca04566226df2f26192341ff4b772c194

    SHA512

    a4d65aae388b9dd8a9fc85c56d45a4d89b672a4c25ec42bbf92e772d4d9a68b057739f97832ae90cbbed995b8985241b19447a2536673c33d4654d99c4d0f373

  • \??\c:\windows\SysWOW64\tgi.dll

    Filesize

    51KB

    MD5

    1baeb01755c8b482301e06c1305d2c90

    SHA1

    1a8afb4922e3bd4c39b28c591f03459a6d66b617

    SHA256

    6788ae33903b2ddb216d7a3160b9bed5152d090cc76869c54b68f599de7570ac

    SHA512

    87c871db6b5814a8faf299ed20b7f6c0a8275b2b8d5ca29df7326b68e5544698feff4c5db489bf11dd46d10102a06c7cee5f62ac7dd8f146ddb68f8fb8448c82