Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 10:27

General

  • Target

    00dadc4239b025ceceee27a2df737438_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    00dadc4239b025ceceee27a2df737438

  • SHA1

    f0d2b320c41058fafc4189bbc4ca344fefdd3eec

  • SHA256

    ef3ee5b1c5aeeae83b68e140e1b731f3ed4e363f258f579dda7b84b35f1c06bf

  • SHA512

    89879c8d546fe5b842bd3b12409c7c07ecf432c9b8ad9173b18196e64738bd56c73dec720104db0f206d7289a8d89942228794dd8edbd69b907a03ed506ab999

  • SSDEEP

    1536:Kf9jIMDovoxKJ91zageJudHIV7eE5tD3jgul:KfWBvEK31zagesqVdXjH

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00dadc4239b025ceceee27a2df737438_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00dadc4239b025ceceee27a2df737438_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\YMIS.dll,DllRegisterServer
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\Rundll32.exe
        C:\Windows\system32\Rundll32.exe C:\Windows\system32\YMIS.dll,DllUnregisterServer
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:4764
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\e4tzTJR.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\YMIS.dll

          Filesize

          32KB

          MD5

          14d31db687015ceba9cb99f4b852ec82

          SHA1

          22ac29d649b54c8dd5ba62a179641b094a7452b6

          SHA256

          f8240dbf8ac330925af2a652e201fd9ed2dddb4625dd99ef6f7355aacdc8990e

          SHA512

          a3fad86ab9be1731fbf69b5a80a319e1369db69f8cbe31dc91ffb5305244951031cb39b4d0908b2c78c087629373af360488ff90a5e14128e5f98a20c4d0c4b0

        • C:\Windows\SysWOW64\e4tzTJR.bat

          Filesize

          30B

          MD5

          95d10b80a6acdbaf5412f2c2dcbb1778

          SHA1

          798834c473e126946abca4a9368d433e4bd233d5

          SHA256

          b982f53956cb1064b3f9bf08e6fbeada1725621fd9a114974ba9fa1cac25cbaf

          SHA512

          389a80216e08293b0cd2ba8e1f84642bacd333c89b146b2c452ad7a494fb5eafcbbdc3b4dc791dcec6f2955eff6fde85e9963135fbff7a87fba7448dce402f85

        • C:\Windows\SysWOW64\lma2sT.bat

          Filesize

          249B

          MD5

          de08306cd8d10a3dba47c0467297214b

          SHA1

          1d8dfed04879e68460892d74ea8a92944f2792ad

          SHA256

          57fb9b3f5346e87fd9cc8f395a14123bbf22c88cbb735eadb7ee9cabb3e8d105

          SHA512

          dd0534dc0dee4588216ef8c6cf83f1ad69adb46b742fd370c0f9d6793872a1e92c4b7c7e67765ddf7702955f5feeb058e340d4be42038e87faf9def767388f43

        • memory/3480-0-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/3480-13-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB