Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 20:11

General

  • Target

    41d9078262c1e7897521578078204cbf_JaffaCakes118.exe

  • Size

    832KB

  • MD5

    41d9078262c1e7897521578078204cbf

  • SHA1

    42dc667acaa80cc721c2799b1e080981bdaf63aa

  • SHA256

    4c97a2d092fea544ff1670059a079066b3c46e9af34fb00c0436f52c98f9f44c

  • SHA512

    d04751bc47c59d5fc33bdcfb5534911bb6af288ee3987d948b87ad535b5b8ceedcd3a408ed8e3314869a7df4747c06c7fed7793337e254bd160d9d22b4f67a14

  • SSDEEP

    12288:QgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUrp:2xsKXa+hHyWseBg

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 26 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d9078262c1e7897521578078204cbf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41d9078262c1e7897521578078204cbf_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe
      "C:\Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe" "c:\users\admin\appdata\local\temp\41d9078262c1e7897521578078204cbf_jaffacakes118.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\ksufhq.exe
        "C:\Users\Admin\AppData\Local\Temp\ksufhq.exe" "-C:\Users\Admin\AppData\Local\Temp\woavhaocskdjmeay.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:1048
      • C:\Users\Admin\AppData\Local\Temp\ksufhq.exe
        "C:\Users\Admin\AppData\Local\Temp\ksufhq.exe" "-C:\Users\Admin\AppData\Local\Temp\woavhaocskdjmeay.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2892
    • C:\Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe
      "C:\Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe" "c:\users\admin\appdata\local\temp\41d9078262c1e7897521578078204cbf_jaffacakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:2220

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          12cd2db6474ba6ec04dfcc1f9e7b3086

          SHA1

          b79882f327512aed9b011ce7d795c833cb995417

          SHA256

          4dc6a87a7fcbf05a95ddead9e32df9d567f43d80a99158af5765c4b0c58f1e0b

          SHA512

          d37d93f86ccd075259b09640dc71916d3902700ed69d769bd4f0f60c578f77a9c645b95d246817f08ec304ec83d6700fddf048091372ae29e2c504d69dfafa01

        • C:\Program Files (x86)\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          94e7a7699666da98c5c04f0d84551605

          SHA1

          a96210818f10333eb20d78fba3e2063739120dc7

          SHA256

          caad9af8af385f6acd39eca82b3a9e3af2e6095832ae521b99b2655c1a4435c9

          SHA512

          4293a85aa5134cc86e05b706e72f67eb7b963a38b50b487651bd5bf2ffe5728dc08184bf4711269e4933681db93117dec566c8a1d4c54312a5a64b92fe7351ba

        • C:\Users\Admin\AppData\Local\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          976ac4b0e62e64d994d907c6c2d68317

          SHA1

          5b921f4af9c403a4fb4d2de0db299e523085f7b1

          SHA256

          056573954a4f5b9cf829c6eabea9ecd463a3e5cc3e93b1d04c2b2fe974631069

          SHA512

          2826ac0528b31952587712d6f5e83f201fae59b204358b46ebb7f44385a6464dd33c7e9d4240bbca0cd998ec2cd69b2ad288235422c51843137a4f567d81b4d7

        • C:\Users\Admin\AppData\Local\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          1a3e9bf63ab4ae90156fd19ec3001076

          SHA1

          0d514a6ef3af4d43bb7cd940c5bc758d47f54337

          SHA256

          27df774c1891286c420e9b1991bc5f9bbf968d7f2aab3ca071fed71c2dfabff2

          SHA512

          37bee6e442ad0464c95113a5258653279567ea31a39a8fe4d8b52b2aea278098df3ced250a04e6e7ccaec81c18b9bb0941f1c0698a484c7b84b795ba9236c9d6

        • C:\Users\Admin\AppData\Local\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          f72e7b5c54c36bf33455a0dcdba2404e

          SHA1

          88949cdcdc0ec229275a970d760a64978ba5c3fa

          SHA256

          099479a4d9e3735315c3c405b4262d4e30ed05bb361e214cbfdfd1a883ac6c10

          SHA512

          243e2df91ccebf983daabbb5be50eb10c969d5e0b8263d1713b8043d2311d68bfb88cc272e914494028ecd50984111a642e79d70a0d6e5ec219fd682bbffc134

        • C:\Users\Admin\AppData\Local\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          80a8b4a7c6f526df4bc6e07dd6e115a2

          SHA1

          6629b7f489a377fbbdee52ac6d1f434011adcdba

          SHA256

          2d67d2e59e2292dfaf26bf7f386672ae422f4ab201d80ec10a717a518d2e767d

          SHA512

          3f14b296fc2f3ff2ee2fc9bc2eb2e37ac2b9108c389c9560f96e824015c3f8f0b6c529afa9ffed2b3ff77069278c646a0aa0189b4a21582fe85924d3d47512c0

        • C:\Users\Admin\AppData\Local\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          72cdb9de9c74caa5afe9b89c097b5e1a

          SHA1

          492d10c0ebc390f7cc1d8c9d35e32b6a54a9819f

          SHA256

          b60bbe483c59c4622dfb7e3a7c6113b9461ea356a7a1a8f680a869f64083e899

          SHA512

          8b57018f43585d73c9666b64db970f4753df78661937d531f23221b8bfd40083a85b486ea57acab7f64c051a64b0053923db0e0ecb6fdf2029b2d4bcd11ca6df

        • C:\Users\Admin\AppData\Local\qwwffmoquahbsyiurvkqqzzgik.ubv

          Filesize

          272B

          MD5

          9939f97b976a1227eecd55406ffccfd5

          SHA1

          cf3af6b690811ec522b4686b1c24bc9fcc3ac007

          SHA256

          ca3f53112f419dbbc3d756ea77d01c820d2ae65bc89693444f5f3e9556c06e40

          SHA512

          9af23097edeaf9c78e721d902c9151ae763b0134b416b3c9e52e3205ca05c53609cdb038781bac16047bf41e66227d0a5d6c3db98d3290139c8849c8b907d4f5

        • C:\Users\Admin\AppData\Local\ritnyqdqfwotvmhembbsdxianapgydfwrowll.nhs

          Filesize

          3KB

          MD5

          09fc8e46e1527eb2623ce4175826f466

          SHA1

          f7ebaa647a172e235d44155b9bb5ae0f82828a23

          SHA256

          70db2fc801a47153e506ae0593f82ae120d5f09a0a8fea269815ceec5d3293be

          SHA512

          f652153c14f52b0caa7dd3fd3b26aab4b15f08bf6f3a7706e64320999cd56492c96dc6fa57affb88584a5a67380e433c00957430b83a666baa32eb6ed2ef3b8a

        • C:\Windows\SysWOW64\mgurfaqgysnvaussdv.exe

          Filesize

          832KB

          MD5

          41d9078262c1e7897521578078204cbf

          SHA1

          42dc667acaa80cc721c2799b1e080981bdaf63aa

          SHA256

          4c97a2d092fea544ff1670059a079066b3c46e9af34fb00c0436f52c98f9f44c

          SHA512

          d04751bc47c59d5fc33bdcfb5534911bb6af288ee3987d948b87ad535b5b8ceedcd3a408ed8e3314869a7df4747c06c7fed7793337e254bd160d9d22b4f67a14

        • \Users\Admin\AppData\Local\Temp\ksufhq.exe

          Filesize

          700KB

          MD5

          f5b283b98a30728c15f1043fba0a9640

          SHA1

          4818cb833391aecf672112fcdab44410de531dc9

          SHA256

          83e8cdfbdcb6d65ada23596d475f8a7b800f7bf8a64baad9799ddbcd9141137b

          SHA512

          0e379df66ffee7b413ba9bacc0bf336e1d5b8f855f1ef1ab3759e917db204955ba989ea00038deda91076497b98a965fcf315c77d98cb6e7b01d319436f1e9ac

        • \Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe

          Filesize

          320KB

          MD5

          1dd5dd5561723f37ccc81e15ecdbf830

          SHA1

          eeb9131c8d276ceb710d163e89fdc62b3e111971

          SHA256

          c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126

          SHA512

          b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5