Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 09:29

General

  • Target

    1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe

  • Size

    299KB

  • MD5

    1ac562c103f397bc360eb5a20f921a3c

  • SHA1

    6b850fca8a549ef197abf6f60b2f27ace6feea92

  • SHA256

    093b230ba4c569b847d0fe6319faac0fafe6c26fa808fa45f81def8f770c1a23

  • SHA512

    b78cae3dd26688507672f230531a18d5aaa3ce8fec90bab23f6ad867ceb24c3c67c43ad488c17233c0bb2071a7fe73be92786af505aaeaeda14be5d1d38c0bac

  • SSDEEP

    6144:ef3tv8uK5A5phFKlrINwmIETCcH4JJ96KIi3eLWOStEB8wP2YGpLeBOrMwsg:ef3x8uKIphFKaN5TGJj7rzEP29VeW3sg

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Program Files\Common Files\Services\csboyDVD.dll
      "C:\Program Files\Common Files\Services\csboyDVD.dll"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe
        "C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2796
    • C:\Program Files\Common Files\Services\services.exe
      "C:\Program Files\Common Files\Services\services.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 536
        3⤵
        • Program crash
        PID:3324
    • C:\Program Files\Common Files\Services\csboyAuTo.dll
      "C:\Program Files\Common Files\Services\csboyAuTo.dll"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Program Files\Common Files\Services\services.exe
        "C:\Program Files\Common Files\Services\services.exe"
        3⤵
        • Executes dropped EXE
        PID:1652
    • C:\Program Files\Common Files\Services\csboyTT.dll
      "C:\Program Files\Common Files\Services\csboyTT.dll"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3220
  • C:\Program Files\Common Files\Services\csboyAuTo.dll
    "C:\Program Files\Common Files\Services\csboyAuTo.dll"
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Program Files\Common Files\Services\services.exe
      "C:\Program Files\Common Files\Services\services.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 512
        3⤵
        • Program crash
        PID:3744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2100 -ip 2100
    1⤵
      PID:4016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3296 -ip 3296
      1⤵
        PID:1392

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Common Files\Services\csboyAuTo.dll
        Filesize

        47.7MB

        MD5

        a48d21d88d5b1185663baa9e80cc3f1b

        SHA1

        3297b71c8d8d12209c2c3b0b6fad439245f43bd6

        SHA256

        609a1b3db77a7826d4873170677f8c0145dc927c493799a15aa5f024a07d186a

        SHA512

        60b07a32cc2483be2fde7715f9be9272a0bdf75b4cba8257515cc191b55e07d2f9022f5a63e7c8ec891eb525917895358a609dfdf039bd50e85f0e6d40938147

      • C:\Program Files\Common Files\Services\csboyDVD.dll
        Filesize

        606KB

        MD5

        a1d054fe6432de825fffd202ae760e80

        SHA1

        16040f867221ce7191b0653840ce5989c99710b1

        SHA256

        1ddb450f29fbf62d80447fec9e8629f51ab74902f163963a76157cff75e9db9a

        SHA512

        6e42f8acc1cff53032d8ec3cae48e0bb93864d46137d872e35f4e46f5514c267e1b7ba02f64b90108ae6b8f04e16a35f8966e95e886e5728e8f9368221fd90b1

      • C:\Program Files\Common Files\Services\csboyTT.dll
        Filesize

        47.7MB

        MD5

        e0543f7b26904208a24b6d14750abbe4

        SHA1

        991b8ce1c3903122b9733e88daa7821f114131ba

        SHA256

        49250843107d36be1cbe6ccc5f2442db8ac33cfce3ffc108df3be904fd09f1c2

        SHA512

        a175afdf830da027d0bc38aea92470b479c1a5c1796606f06a22bb8fabebb36f170843f90b0e9e6ed36963973ceeb9ce7beee7165b86ea5ec15f139e0122c5c5

      • C:\Program Files\Common Files\Services\services.exe
        Filesize

        47.8MB

        MD5

        16b56f9aa9b5cf71985c439960f425a6

        SHA1

        cdf32dad677a7eeb909ec3b098dadd02fe3eaa4c

        SHA256

        cb164f83a6450489d4d195d56250eca2c2da188acbea883fc8b0c963659d1642

        SHA512

        a29088d1d9baef2dda02c3238af78b68a023a19bfdcc8b1aff31bfb7dbcbfc1970543a2d7f1d1d897b2d35c90e0d694e287d9b042434696d4b6a0bde0a8e3f25

      • C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe
        Filesize

        252KB

        MD5

        90027e51a3b1807742cd15fd33721d7e

        SHA1

        cfb69530f4e0f0b8cded8d28f527c74ad8fa9546

        SHA256

        13df7b5cd1da553331134b0105523bf20662da9bdd7416c7b98f6a562fd06b15

        SHA512

        29729d843c8ca71624078bf22e8374f3a41f7b2f39f51c552a72d1d33bf8518d434873ad2bd23e48874978e9896869b2505f03dbbf32269ade501b876b2f7df1

      • memory/1652-44-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/1652-46-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/1652-43-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/1780-8-0x0000000000400000-0x000000000044E000-memory.dmp
        Filesize

        312KB

      • memory/1780-11-0x0000000000400000-0x000000000044E000-memory.dmp
        Filesize

        312KB

      • memory/1780-12-0x00000000001C0000-0x00000000001C2000-memory.dmp
        Filesize

        8KB

      • memory/2100-62-0x0000000000401000-0x000000000041B000-memory.dmp
        Filesize

        104KB

      • memory/2100-26-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/2100-27-0x0000000000401000-0x000000000041B000-memory.dmp
        Filesize

        104KB

      • memory/2100-28-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/2100-30-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/2100-29-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/2592-40-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2592-0-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2592-71-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2592-1-0x00000000001C0000-0x00000000001C2000-memory.dmp
        Filesize

        8KB

      • memory/2592-22-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2592-33-0x00000000001C0000-0x00000000001C2000-memory.dmp
        Filesize

        8KB

      • memory/2616-41-0x0000000000400000-0x0000000000414000-memory.dmp
        Filesize

        80KB

      • memory/2616-56-0x0000000000400000-0x0000000000414000-memory.dmp
        Filesize

        80KB

      • memory/2796-16-0x0000000000400000-0x0000000000441000-memory.dmp
        Filesize

        260KB

      • memory/3220-70-0x0000000000400000-0x0000000000418000-memory.dmp
        Filesize

        96KB

      • memory/3220-68-0x0000000000400000-0x0000000000418000-memory.dmp
        Filesize

        96KB

      • memory/3220-77-0x0000000000400000-0x0000000000418000-memory.dmp
        Filesize

        96KB

      • memory/3296-54-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/3296-50-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/3296-53-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/3296-73-0x0000000000400000-0x0000000000430F69-memory.dmp
        Filesize

        195KB

      • memory/4444-48-0x0000000000400000-0x0000000000414000-memory.dmp
        Filesize

        80KB

      • memory/4444-52-0x0000000000400000-0x0000000000414000-memory.dmp
        Filesize

        80KB