Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2024 19:52

General

  • Target

    e846b5080f578165bffbcb07655c32d8_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    e846b5080f578165bffbcb07655c32d8

  • SHA1

    08246ce534e4f4d76863bdb84d547aa8c83dd3be

  • SHA256

    986c48a0ef9126decb77b041e0eed10fe508147e1c16737502f5dea958870409

  • SHA512

    755a5cbf3535ef3f88d88b339db9f805cd4b463389d8d16300222dbb63679bbc23fd315b6ba641f80849cd3b45db7693bca7ca48f822846fc5b5544654817f98

  • SSDEEP

    1536:5m9nw/hT31GCSI6WB3IMeCn7EI50rO9nw/hT31Gl:P5T3BF6sYMF725T3m

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 18 IoCs
  • Disables RegEdit via registry modification 8 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e846b5080f578165bffbcb07655c32d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e846b5080f578165bffbcb07655c32d8_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\SysWOW64\s4827\smss.exe
      "C:\Windows\system32\s4827\smss.exe" ~Brontok~Log~
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Windows\SysWOW64\s4827\winlogon.exe
        "C:\Windows\system32\s4827\winlogon.exe" ~Brontok~Is~The~Best~
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\SysWOW64\s4827\services.exe
          "C:\Windows\system32\s4827\services.exe" ~Brontok~Serv~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:1056
        • C:\Windows\SysWOW64\s4827\csrss.exe
          "C:\Windows\system32\s4827\csrss.exe" ~Brontok~SpreadMail~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:3000
        • C:\Windows\SysWOW64\s4827\lsass.exe
          "C:\Windows\system32\s4827\lsass.exe" ~Brontok~Network~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:4056
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c net view /domain > "C:\Windows\system32\s4827\domlist.txt"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:5024
            • C:\Windows\SysWOW64\net.exe
              net view /domain
              6⤵
              • Discovers systems in the same network
              PID:1756
        • C:\Windows\Ad10218\qm4623.exe
          "C:\Windows\Ad10218\qm4623.exe" ~Brontok~Back~Log~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:1496
        • C:\Windows\SysWOW64\s4827\m4623.exe
          "C:\Windows\system32\s4827\m4623.exe" ~Brontok~Back~Log~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:3556
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" /delete /y
          4⤵
            PID:4872
          • C:\Windows\SysWOW64\at.exe
            "C:\Windows\System32\at.exe" 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"
            4⤵
              PID:4616
            • C:\Windows\SysWOW64\at.exe
              "C:\Windows\System32\at.exe" 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"
              4⤵
                PID:116

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Ad10218\qm4623.exe

          Filesize

          53KB

          MD5

          bae4698810dfc40c129c6f07f6e4ca15

          SHA1

          876d3e9af3ad9921a35e39e618163c5e750aedda

          SHA256

          b612d9dba0eb0cf786b2edee063435f8e9a287a5718b0b9cf0c42ade327012ff

          SHA512

          f68e069ea51b6d90c81687f5d8ea34729c93c59eb45b13bec06518606825621d356d1a338cc22ae0377626bf17e0a6eb07f188eb220c47ef43110770c9eb10e3

        • C:\Windows\SysWOW64\c_29442k.com

          Filesize

          53KB

          MD5

          e846b5080f578165bffbcb07655c32d8

          SHA1

          08246ce534e4f4d76863bdb84d547aa8c83dd3be

          SHA256

          986c48a0ef9126decb77b041e0eed10fe508147e1c16737502f5dea958870409

          SHA512

          755a5cbf3535ef3f88d88b339db9f805cd4b463389d8d16300222dbb63679bbc23fd315b6ba641f80849cd3b45db7693bca7ca48f822846fc5b5544654817f98

        • C:\Windows\SysWOW64\s4827\lsass.exe

          Filesize

          53KB

          MD5

          5288347466856f203ba44459d6704519

          SHA1

          75e7e3d08c1945fbc18e724d8c25432682a25c62

          SHA256

          218ed096cb81465d853f9e631183cb28958461e5d070544c9805796738226134

          SHA512

          c123045851ed6b6210622635edcc90439c4e6dfde733159d3228d1a6626466cb8c91f3aa331182ad3630233ae95d876539c5e88c17920e70a85aa61e5324ae58

        • C:\Windows\SysWOW64\s4827\m4623.exe

          Filesize

          53KB

          MD5

          c5d6aef90597415d8d7be8ff48879155

          SHA1

          4ba74b5cc149e7e11d0fde893dbec8efe0a812af

          SHA256

          e6cc0de8404bd4bed4f3233022b57b3cbddaa63f986fd3713430739e67c3b06d

          SHA512

          92a9398392af7fcac47044275c0dc450a4043e32e735de45afbcc8c6fa13f0b6ecbc0ad1ad4fe3641a92405cb2d4d9f9f36c5451cb17adfe41f2e075c0641caa

        • C:\Windows\SysWOW64\s4827\winlogon.exe

          Filesize

          53KB

          MD5

          f101feb45c43d65a2c55c257836c6190

          SHA1

          05563df9440f5c59ccc0510b47b739f6900167d2

          SHA256

          45d9571ca5ef5669790e38d05a54fb6fb29adfbd8f92149e20291600cf65f439

          SHA512

          fb01ee0ec25c045cf5b9d89f673154225d012f6f57a05c1decbf9236d838b76b0c6d422a13e3c5a500a00f01efadc784f521feee309cecf607bbc91ed4a5e609

        • memory/804-1076-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-992-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-869-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-1161-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-318-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-785-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-701-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-1245-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-71-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-617-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-494-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/804-410-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-508-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-702-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-1201-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-993-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-909-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-1285-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-799-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-618-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-320-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1056-1077-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-330-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-705-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-1204-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-621-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-414-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-802-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-1093-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-511-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-912-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-996-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/1496-139-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3000-328-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3232-153-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-622-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-415-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-997-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-803-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-706-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-512-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-1094-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-913-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-331-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-147-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/3556-1205-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/4056-131-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/4056-329-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/4972-0-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB

        • memory/4972-44-0x0000000000400000-0x000000000041C040-memory.dmp

          Filesize

          112KB