Analysis

  • max time kernel
    17s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 21:26

Errors

Reason
Machine shutdown

General

  • Target

    25afa22d22a1aba6b3bc1fc2515b0ea3_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    25afa22d22a1aba6b3bc1fc2515b0ea3

  • SHA1

    d5b87eb29ee867ae173cc8a5872208d3e55ba2ca

  • SHA256

    a6a289746093f6fdf796182730aad23191710fdd456db16149ec5d2bb7e35878

  • SHA512

    0dbcf12f0babc966b61d24db9a404dd0c54a14a9590dd0dadd28818b419f3343c8838b6cb23a0a7e353aa6345ebdff5a7ff28dd193719f7f081c746af1b6e6f9

  • SSDEEP

    3072:cwJIp7cy+4+eW3s0cD6TtNpgSE0fn3Qx0hEqcmhBVjqeGoEqc9im/6TePHPmrCdX:cLJcyvEX7TtNSSE0fgxNW5ki89uCHB

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25afa22d22a1aba6b3bc1fc2515b0ea3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25afa22d22a1aba6b3bc1fc2515b0ea3_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\ovc.exe
      "C:\Users\Admin\AppData\Local\Temp\ovc.exe"
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3884
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Iprip
    1⤵
    • Server Software Component: Terminal Services DLL
    • Impair Defenses: Safe Mode Boot
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1204
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa38c0855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2480

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ovc.exe

          Filesize

          20KB

          MD5

          9d9f21bae7abe44941a5244856046370

          SHA1

          9ccdb559287f48fb17baffb910c62cbb64607209

          SHA256

          5e7aa65bbd61071a101b3f2930f700eb1158dfe280843de559a5ca83269869ce

          SHA512

          61daf2adafad09493a174c8a36dfeccfc21411cbaa2bcbdda7dfab6ffac5dab187a944ae3a5474bd3671345d1630cdc679ffd8b3907e10ee688108f3d04164e8

        • C:\Windows\SysWOW64\fsutk.dll

          Filesize

          116KB

          MD5

          4ace9cc414efaf0b623d6a3ec0b9a4ea

          SHA1

          dd90c3faeee868bfa14830c754fba57fbb57365b

          SHA256

          5e821d9479aae637e50fe69df852dbd7290ba7c1e23a673681afdd9cce752702

          SHA512

          49b28e907ccc774d453985e1825d7da6ec7c9618cea52f068407e5b96be0dd7691cea8366be2b373ece2988d4a55a8b6666fc59dfc677455e700ebd91755c074

        • \??\c:\$Recycle.bin\int.dat

          Filesize

          220KB

          MD5

          eb2d760a608a00335de9e7d11a228870

          SHA1

          63b0d15450c79b2cad22ddb82b917dc5b979c57f

          SHA256

          990a0b7b2fa2e7b2b798629b539c96fe85dd03da336c31ab59f4f31c9b71aa05

          SHA512

          0e4ce27c32010194cc694706f3fa44cd4ee9d55cbf33cda567ad8ad7f2c5ebdcd2bfb13d9bffb7d6033e70bae985749225380176ed46429028c4edb9860e75e4

        • \??\c:\windows\SysWOW64\liprip.dll

          Filesize

          84KB

          MD5

          4c08a606a6c58c54f1d6b446513be973

          SHA1

          b5b5b6e2f32d87df9706e23bda35b055042bacc1

          SHA256

          c4a6ab71557d1964b9ab577fa80c46495266fa5aa5c37c03bbdc89f495a4e88c

          SHA512

          5280326b2610007dea42f8c69d43638c6bb54a5e062d0109e7c135334b20b78ec69429130b41ffc8b7751e4fa4882302259708b72cd7408b3835a8daa3de27d7

        • memory/1204-17-0x0000000002100000-0x0000000002120000-memory.dmp

          Filesize

          128KB