Analysis

  • max time kernel
    143s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 06:08

General

  • Target

    093def93805452c55701297283764791_JaffaCakes118.exe

  • Size

    346KB

  • MD5

    093def93805452c55701297283764791

  • SHA1

    be1fa6851dd554d5f3d49877824a7fca35b5f591

  • SHA256

    c0b3c302ae07173caa57c15bbd9e2cb965ffeb75ce22985d9c8f40753a02b6a4

  • SHA512

    8a3185100bfab093d69cdd4589e74eae59fcd297c6e1124bc4a095f105356a3137fed2510f1735f058da70b84356075504422e78b561d809eb4a98446368575e

  • SSDEEP

    6144:qYl4NNIcW4xSj6fYAAPWaTVvMo492aUjHt:nWNNIn4e6QUoj

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\093def93805452c55701297283764791_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\093def93805452c55701297283764791_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\system32\cmd.exe
      "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2636
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\093def93805452c55701297283764791_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
        C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\093def93805452c55701297283764791_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1248
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Windows\system32\cmd.exe
            "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1908
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1584
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2472
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3024
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2988
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Roaming\services64.exe"
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
              C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Roaming\services64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2080
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2292
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                  8⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:884
              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                7⤵
                • Executes dropped EXE
                PID:1868
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
                7⤵
                  PID:2068
                  • C:\Windows\system32\choice.exe
                    choice /C Y /N /D Y /T 3
                    8⤵
                      PID:844
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1252
              • C:\Windows\system32\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:1756

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2de77051c4dfe1289769349d4a0b9f6a

          SHA1

          25b41aea628f28359730e2e96eda5527350affcf

          SHA256

          43629a5e81764214ab3aeb8d9e851ee32b3403cd9f67774287f6219d792c6ada

          SHA512

          ae9a819faf1d7a87e96f6451c9e0b925ae79fbf7ff1c360a3ca122c585f9136981e3eb73f4775f2e96016ad8f7e4fbea1f00017103644d1f5717c64ce65d8511

        • C:\Users\Admin\AppData\Local\Temp\Cab4CAC.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar4CFD.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          eb28166fc81d7036ea06c6b73d20c621

          SHA1

          8fb95a58c48ebd38cf0e83539f189727024bda1d

          SHA256

          afbc20ee4f7de9b1769af0f664b7e0d5c966666518f0d274a972765c559af6c5

          SHA512

          ab7253916f92061e15728b3a3753dbd090dd9503034da0e2ed7a7fbcee71b01fcf46b41aaa6dd26c540e9dd9ba8b99151de3f4e82cc1441df5f22b88bb670149

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          6d848bb191eb9405089af3f0dd7da9f0

          SHA1

          866a9fb1a2da3b0b8a2bb829283786fb7b020e3e

          SHA256

          c3397a1b1b16c8f044f9a1b9a58fddddc17e38f44529223a683a3c74b504a1b0

          SHA512

          a84c1d2f98618633eade4a3b70e6e89082408487b3bac0bb00acd3632de763967ca88dcd2ff2d3ff21e3651358f58f4dd95fa7ccc3d3b5b411609d9b3303d020

        • \Users\Admin\AppData\Local\Temp\svchost64.exe

          Filesize

          153KB

          MD5

          384b832bc2c17307425051058760d122

          SHA1

          878cb6bfa5b5226828fe467d5f5926181896322d

          SHA256

          a594576131ba456c3fb5fbe298436b7b8a67d42c828fbd828b1c0fbc04ead888

          SHA512

          c6313d6e5dc5a075ec2f7dce81af72bf107089c8d82b62d0a7fe2a77ed2ca6010c1dcf6b294dff10bebef9c93eb2030707f81c177f49292e54f60fbf7f3199d4

        • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

          Filesize

          61KB

          MD5

          59abdd1bed27334c1e381b57d17ef79e

          SHA1

          50f87d372a6baea872fb98bb95b84acc764bf9d8

          SHA256

          0ded18715b8ac6632e91175af38d8c49cd188f5fe52274ef5e567238340b602e

          SHA512

          7b7a8adf8df2fdb25e084e9727d977f34bd085eae4ee65171c4d9f9c0a678545900e11ddd413dab2a7be03dbfe281a5c6596c3ca4b91f37d083df87a47472222

        • \Users\Admin\AppData\Roaming\services64.exe

          Filesize

          346KB

          MD5

          093def93805452c55701297283764791

          SHA1

          be1fa6851dd554d5f3d49877824a7fca35b5f591

          SHA256

          c0b3c302ae07173caa57c15bbd9e2cb965ffeb75ce22985d9c8f40753a02b6a4

          SHA512

          8a3185100bfab093d69cdd4589e74eae59fcd297c6e1124bc4a095f105356a3137fed2510f1735f058da70b84356075504422e78b561d809eb4a98446368575e

        • memory/1332-42-0x0000000000140000-0x0000000000158000-memory.dmp

          Filesize

          96KB

        • memory/1332-41-0x000000013FA40000-0x000000013FA6C000-memory.dmp

          Filesize

          176KB

        • memory/1604-49-0x000000013FE90000-0x000000013FEEA000-memory.dmp

          Filesize

          360KB

        • memory/1692-1-0x000000013F4F0000-0x000000013F54A000-memory.dmp

          Filesize

          360KB

        • memory/1692-6-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

          Filesize

          9.9MB

        • memory/1692-33-0x000007FEF5E53000-0x000007FEF5E54000-memory.dmp

          Filesize

          4KB

        • memory/1692-34-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

          Filesize

          9.9MB

        • memory/1692-36-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

          Filesize

          9.9MB

        • memory/1692-0-0x000007FEF5E53000-0x000007FEF5E54000-memory.dmp

          Filesize

          4KB

        • memory/1868-85-0x0000000000860000-0x0000000000866000-memory.dmp

          Filesize

          24KB

        • memory/1868-84-0x000000013F440000-0x000000013F456000-memory.dmp

          Filesize

          88KB

        • memory/2080-76-0x000000013F340000-0x000000013F36C000-memory.dmp

          Filesize

          176KB

        • memory/2216-11-0x000007FEF31B0000-0x000007FEF3B4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2216-10-0x000007FEF31B0000-0x000007FEF3B4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2216-9-0x000000001B620000-0x000000001B902000-memory.dmp

          Filesize

          2.9MB

        • memory/2216-13-0x000007FEF31B0000-0x000007FEF3B4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2216-12-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

          Filesize

          32KB

        • memory/2216-7-0x0000000002B50000-0x0000000002BD0000-memory.dmp

          Filesize

          512KB

        • memory/2216-8-0x000007FEF346E000-0x000007FEF346F000-memory.dmp

          Filesize

          4KB

        • memory/2216-14-0x000007FEF31B0000-0x000007FEF3B4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2752-21-0x00000000027E0000-0x00000000027E8000-memory.dmp

          Filesize

          32KB

        • memory/2752-20-0x000000001B510000-0x000000001B7F2000-memory.dmp

          Filesize

          2.9MB