Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 08:36

General

  • Target

    2e06da81ef1e43324d41019feffd94b6_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    2e06da81ef1e43324d41019feffd94b6

  • SHA1

    dcb236c4023a2a9bc52ce8ee4af1e7907f9e2786

  • SHA256

    0eb4db9b2f572c0921a567227cc07cd4d67c7649196d1b5820d2bc5a185061d6

  • SHA512

    b64ead8ce43fcbfc1564afd34cd44109c5d2485769c6b98022b8dc93e56207066db5d9b58e2a4cbe0c78c278ca192a7ac3480481bedde4818c3f27893a04afca

  • SSDEEP

    3072:P7fKMePXVLMRmN1qlaTyAAnNRACnnnmqOYJWn88nnH6nn5SnnbldcPu1+d:zKvPXVTGnNRACnnnLWn88nnH6nn5Snnu

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e06da81ef1e43324d41019feffd94b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e06da81ef1e43324d41019feffd94b6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create pmxviceo32 type= share start= auto DisplayName= "Visioneer Device Micro Driver DLL" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\pmxviceo32.dll,yloc"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2792
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description pmxviceo32 "Visioneer Device Micro Driver DLL"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2912
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall add portopening TCP 1552 messenger
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2908
    • C:\Users\Admin\AppData\Local\Temp\4f19690c.exe
      "C:\Users\Admin\AppData\Local\Temp\4f19690c.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4f19690c.exe

    Filesize

    47KB

    MD5

    0556622e82d0bf6fdc45cc90b68ff494

    SHA1

    1c70fc0836da64d9714789b57d92edfa0ac7a39e

    SHA256

    3d40fa67ae04cdfdf2f0c05c6005bdcdbfd400815c337b6e3cb2d4f518a24174

    SHA512

    4abfbb324edb7f9a391c592953e88555e9dbf4db8b266eabad921332e4584fff793f627085c8a61521ee26b2e7ee608f3a64b387fe5049a3c7a19c50598dfdb8

  • memory/2112-16-0x0000000002AB0000-0x0000000002AD7000-memory.dmp

    Filesize

    156KB

  • memory/2112-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2112-20-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2112-18-0x0000000002AB0000-0x0000000002AD7000-memory.dmp

    Filesize

    156KB

  • memory/3016-26-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-28-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-23-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-24-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-25-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-21-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-27-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-22-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-29-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-30-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-31-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-32-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-33-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-34-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-35-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3016-36-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB