Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 09:29

General

  • Target

    1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe

  • Size

    299KB

  • MD5

    1ac562c103f397bc360eb5a20f921a3c

  • SHA1

    6b850fca8a549ef197abf6f60b2f27ace6feea92

  • SHA256

    093b230ba4c569b847d0fe6319faac0fafe6c26fa808fa45f81def8f770c1a23

  • SHA512

    b78cae3dd26688507672f230531a18d5aaa3ce8fec90bab23f6ad867ceb24c3c67c43ad488c17233c0bb2071a7fe73be92786af505aaeaeda14be5d1d38c0bac

  • SSDEEP

    6144:ef3tv8uK5A5phFKlrINwmIETCcH4JJ96KIi3eLWOStEB8wP2YGpLeBOrMwsg:ef3x8uKIphFKaN5TGJj7rzEP29VeW3sg

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 31 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Program Files\Common Files\Services\csboyDVD.dll
      "C:\Program Files\Common Files\Services\csboyDVD.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe
        "C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2056
    • C:\Program Files\Common Files\Services\services.exe
      "C:\Program Files\Common Files\Services\services.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2612
    • C:\Program Files\Common Files\Services\csboyAuTo.dll
      "C:\Program Files\Common Files\Services\csboyAuTo.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Program Files\Common Files\Services\services.exe
        "C:\Program Files\Common Files\Services\services.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3024
    • C:\Program Files\Common Files\Services\csboyTT.dll
      "C:\Program Files\Common Files\Services\csboyTT.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1364
  • C:\Program Files\Common Files\Services\csboyAuTo.dll
    "C:\Program Files\Common Files\Services\csboyAuTo.dll"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Program Files\Common Files\Services\services.exe
      "C:\Program Files\Common Files\Services\services.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2832

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Common Files\Services\csboyAuTo.dll
    Filesize

    47.7MB

    MD5

    766ddba5d8d2964f6375a133f781d9dd

    SHA1

    da8b4c77cfcb159384a83948d13269ee9db6dcb8

    SHA256

    a5b2c0aaf947d5e996a28ac5e4126c38e7b0f66d486473822441c8c5cd28e56a

    SHA512

    9caa67fcdda64c36e58c2fb40c71c17f2f18833aa7100a3e0b2450beb7ebe0bab3a4b5d077d9d43e0df00a86b8891fa5ffb9e106521886f9d73690fc9a1ecdca

  • \Program Files\Common Files\Services\csboyDVD.dll
    Filesize

    606KB

    MD5

    2c204db0ad6134e2c4820e46f872d77a

    SHA1

    899fed43754fbed45f021c87e9e8d5f38575bc78

    SHA256

    4827a60f3772da9c7c0d21e4392685fe49c34f91bcca8417c08d6f8e05cace7c

    SHA512

    10dab005089dc49c9e88a254fa5ca555f59f87f6d7ee1adf649832003c0274f4e2e3dd7456328d77b610f3b4176bf7f1f86af0ddaa4ec4cfd318ee87e95f7a03

  • \Program Files\Common Files\Services\csboyTT.dll
    Filesize

    47.7MB

    MD5

    07a01a86f1c8d8a6653354794da41240

    SHA1

    138aa7ad46a268b3463a770abf06d4f622b86ab5

    SHA256

    3aaac757e5af4afd13fe39a9f3e32f0e521580febb9daf1a67a7be2441fea0e6

    SHA512

    dbf225ae9a04a58d377047a2e75eb9adf352e8c194136c950151617e024a830b03dbd7c00663562136340ead7240c087ae411c5d6475ef618c37d8355442fd09

  • \Program Files\Common Files\Services\services.exe
    Filesize

    47.8MB

    MD5

    c062c0dad8a2bd0a9a7909c825a7229e

    SHA1

    42ac9bcb37bc520269376176304e9372c4c0f10b

    SHA256

    9d869f424c4094c90e480a9d2cb265a2bd5a78615b891a82a5dc2fbc1f2809e9

    SHA512

    7112be3c1840ffd712a31eb4175fdf459ededce62242755b030c71e597162643fafa22554b31338ae05dbba04146f58f1ae48ff78e367b514221c1c0008d1915

  • \Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe
    Filesize

    252KB

    MD5

    90027e51a3b1807742cd15fd33721d7e

    SHA1

    cfb69530f4e0f0b8cded8d28f527c74ad8fa9546

    SHA256

    13df7b5cd1da553331134b0105523bf20662da9bdd7416c7b98f6a562fd06b15

    SHA512

    29729d843c8ca71624078bf22e8374f3a41f7b2f39f51c552a72d1d33bf8518d434873ad2bd23e48874978e9896869b2505f03dbbf32269ade501b876b2f7df1

  • memory/1364-149-0x0000000000400000-0x0000000000418000-memory.dmp
    Filesize

    96KB

  • memory/1364-151-0x0000000000020000-0x0000000000038000-memory.dmp
    Filesize

    96KB

  • memory/1364-150-0x0000000000020000-0x0000000000038000-memory.dmp
    Filesize

    96KB

  • memory/1364-123-0x0000000000400000-0x0000000000418000-memory.dmp
    Filesize

    96KB

  • memory/1364-129-0x0000000000020000-0x0000000000038000-memory.dmp
    Filesize

    96KB

  • memory/1364-128-0x0000000000020000-0x0000000000038000-memory.dmp
    Filesize

    96KB

  • memory/1364-138-0x0000000000400000-0x0000000000418000-memory.dmp
    Filesize

    96KB

  • memory/2056-34-0x00000000031E0000-0x00000000033E4000-memory.dmp
    Filesize

    2.0MB

  • memory/2056-28-0x0000000000400000-0x0000000000441000-memory.dmp
    Filesize

    260KB

  • memory/2312-18-0x00000000003B0000-0x00000000003FE000-memory.dmp
    Filesize

    312KB

  • memory/2312-26-0x00000000003D0000-0x00000000003D2000-memory.dmp
    Filesize

    8KB

  • memory/2312-58-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/2312-15-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/2312-16-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/2384-122-0x00000000002C0000-0x00000000002D8000-memory.dmp
    Filesize

    96KB

  • memory/2384-106-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/2384-1-0x0000000000230000-0x0000000000292000-memory.dmp
    Filesize

    392KB

  • memory/2384-2-0x0000000000250000-0x0000000000252000-memory.dmp
    Filesize

    8KB

  • memory/2384-67-0x00000000002C0000-0x00000000002D4000-memory.dmp
    Filesize

    80KB

  • memory/2384-73-0x00000000002C0000-0x00000000002D4000-memory.dmp
    Filesize

    80KB

  • memory/2384-8-0x00000000002C0000-0x000000000030E000-memory.dmp
    Filesize

    312KB

  • memory/2384-75-0x00000000002C0000-0x00000000002F1000-memory.dmp
    Filesize

    196KB

  • memory/2384-40-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/2384-59-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/2384-42-0x00000000002C0000-0x00000000002F1000-memory.dmp
    Filesize

    196KB

  • memory/2384-131-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/2384-121-0x00000000002C0000-0x00000000002D4000-memory.dmp
    Filesize

    80KB

  • memory/2384-0-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/2384-48-0x0000000000250000-0x0000000000252000-memory.dmp
    Filesize

    8KB

  • memory/2384-114-0x00000000002C0000-0x00000000002D4000-memory.dmp
    Filesize

    80KB

  • memory/2384-115-0x00000000002C0000-0x00000000002D8000-memory.dmp
    Filesize

    96KB

  • memory/2496-136-0x0000000000020000-0x0000000000034000-memory.dmp
    Filesize

    80KB

  • memory/2496-137-0x0000000000020000-0x0000000000034000-memory.dmp
    Filesize

    80KB

  • memory/2496-140-0x0000000000330000-0x0000000000361000-memory.dmp
    Filesize

    196KB

  • memory/2496-108-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/2496-135-0x0000000000330000-0x0000000000361000-memory.dmp
    Filesize

    196KB

  • memory/2496-84-0x0000000000020000-0x0000000000034000-memory.dmp
    Filesize

    80KB

  • memory/2496-85-0x0000000000020000-0x0000000000034000-memory.dmp
    Filesize

    80KB

  • memory/2496-83-0x0000000000020000-0x0000000000034000-memory.dmp
    Filesize

    80KB

  • memory/2496-74-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/2496-148-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/2496-89-0x0000000000330000-0x0000000000361000-memory.dmp
    Filesize

    196KB

  • memory/2612-49-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/2612-55-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/2612-60-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/2612-54-0x0000000000230000-0x0000000000261000-memory.dmp
    Filesize

    196KB

  • memory/2808-94-0x00000000001B0000-0x00000000001E1000-memory.dmp
    Filesize

    196KB

  • memory/2808-93-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/2832-134-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/2832-102-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/2832-100-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/3024-132-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/3024-104-0x0000000000400000-0x0000000000430F69-memory.dmp
    Filesize

    195KB

  • memory/3024-101-0x0000000000230000-0x0000000000261000-memory.dmp
    Filesize

    196KB

  • memory/3024-99-0x0000000000230000-0x0000000000261000-memory.dmp
    Filesize

    196KB