Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 05:31

General

  • Target

    fde386f0018d598b726a00bdec63f7d2_JaffaCakes118.exe

  • Size

    186KB

  • MD5

    fde386f0018d598b726a00bdec63f7d2

  • SHA1

    97d66e78013e8eb1c75813f59bcefedcb0a1f0e4

  • SHA256

    0c37d530990af9368e74e256c70b11576904a187d6ae0df417f8466706d43401

  • SHA512

    fa4175d5ceeb7790219f15d9975a031fcfef07b3cb76f90edc85ad284e79de8707095f7f50fec3206e84d9e52bf097cdd02afa24615499222a5a52bc5db2281d

  • SSDEEP

    3072:NAHLnXA9Hj8fwnV6rO2thZsduvcvXGD9z2gadTHNk0:NArnwRIfwnVKDHh5D9SRF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:332
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:836
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\fde386f0018d598b726a00bdec63f7d2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\fde386f0018d598b726a00bdec63f7d2_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2908
  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe -Embedding
    1⤵
      PID:1424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system32\consrv.dll

      Filesize

      52KB

      MD5

      6bf2039986af96d98e08824ac6c383fd

      SHA1

      0bb6384656a96943cb427baa92446f987219a02e

      SHA256

      a3e03454ff636f4cdd0a95b856ea9e7857cd3ce0fd2bc6d528ab45781349103f

      SHA512

      fae378badcd6b45d69705d11fe5feb2d9f93fa444249c13aff9b150359ffdbcfe2b160731e193d3e19b6eef18d2ef01de41549a1c2bbdf59501f901511f9068e

    • \??\globalroot\systemroot\assembly\temp\@

      Filesize

      2KB

      MD5

      25617536ee142ad1736e0f2b8f096877

      SHA1

      2be1d410e7763e4466c876338d2631c70d2b3a8b

      SHA256

      911969d85313fa84797ba3280f27272aa71cc737469a92702824bb4d4b1bcaa9

      SHA512

      b484663bcecf842d9b01ff1c4ca7dd439405c4602b473f1bce5084d1ef130ed0f03c7c257b6c687354c5e1d6394572ee790797a4ae393259eb436b4af2f14014

    • memory/332-31-0x0000000000E70000-0x0000000000E81000-memory.dmp

      Filesize

      68KB

    • memory/332-27-0x0000000000E70000-0x0000000000E81000-memory.dmp

      Filesize

      68KB

    • memory/332-21-0x0000000000E70000-0x0000000000E81000-memory.dmp

      Filesize

      68KB

    • memory/332-20-0x0000000000E70000-0x0000000000E81000-memory.dmp

      Filesize

      68KB

    • memory/332-18-0x0000000000E60000-0x0000000000E61000-memory.dmp

      Filesize

      4KB

    • memory/836-43-0x0000000000420000-0x000000000042B000-memory.dmp

      Filesize

      44KB

    • memory/836-33-0x0000000000200000-0x0000000000208000-memory.dmp

      Filesize

      32KB

    • memory/836-34-0x0000000000410000-0x000000000041B000-memory.dmp

      Filesize

      44KB

    • memory/836-38-0x0000000000410000-0x000000000041B000-memory.dmp

      Filesize

      44KB

    • memory/836-42-0x0000000000410000-0x000000000041B000-memory.dmp

      Filesize

      44KB

    • memory/836-46-0x0000000000420000-0x000000000042B000-memory.dmp

      Filesize

      44KB

    • memory/1168-9-0x0000000002550000-0x0000000002556000-memory.dmp

      Filesize

      24KB

    • memory/1168-5-0x0000000002550000-0x0000000002556000-memory.dmp

      Filesize

      24KB

    • memory/1168-13-0x0000000002550000-0x0000000002556000-memory.dmp

      Filesize

      24KB

    • memory/1168-4-0x0000000002540000-0x0000000002542000-memory.dmp

      Filesize

      8KB

    • memory/2120-25-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/2120-30-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/2120-24-0x0000000000413000-0x0000000000417000-memory.dmp

      Filesize

      16KB

    • memory/2120-1-0x0000000000413000-0x0000000000417000-memory.dmp

      Filesize

      16KB

    • memory/2120-3-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/2120-2-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/2120-0-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB