Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 16:19

General

  • Target

    ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ea6726790536078f1519a965c44a11e8

  • SHA1

    eb72a91a1ecc6b3fd5960d092d90de50ae502999

  • SHA256

    dceb5e72706fa58a20c908932dd9a5bd2445ea2c6e412f13253e7f8c2c51e655

  • SHA512

    254a61124f1c5fa0001e5cc4aab7c0fcd3aeb6d4b269529d4c92a897aef6c3aea1a016a2bda6c768ae6cf796083d1f3bc91dee847a8455ed12e907eefc00db6d

  • SSDEEP

    24576:zLgG1Z5DpRkcBLahuWfsFddDz7YXQpwr7w2:P71ZTRk1h1A8XQpt2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe
      "C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\dllhost.exe
        dllhost.exe
        3⤵
          PID:3956
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Giu.mui
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4792
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4300
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^kQLkrNVqMvVPjUboJryRqVXWRCKioBIlzPmMjILBcJFMqlgOxKxlShsdTPxBeNRkOLcvxKVqsEcdfkVGhVNnubsunpTbglnIRxYgORx$" Sento.mui
              5⤵
                PID:4368
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com
                Quel.exe.com h
                5⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3328
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com h
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:1808
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\nifsifq.vbs"
                    7⤵
                    • Blocklisted process makes network request
                    PID:3976
              • C:\Windows\SysWOW64\PING.EXE
                ping ETDALPOV -n 30
                5⤵
                • Runs ping.exe
                PID:1876
        • C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe
          "C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe"
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:4732
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 968
            3⤵
            • Program crash
            PID:2236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 824 -ip 824
        1⤵
          PID:3964

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\FE85.tmp

                Filesize

                297B

                MD5

                bd0c2d8e6b0fe0de4a3869c02ee43a85

                SHA1

                21d8cca90ea489f88c2953156e6c3dec6945388b

                SHA256

                3a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533

                SHA512

                496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Abbozzo.mui

                Filesize

                639KB

                MD5

                4e8629baecebd43750f2bbe47802bd9f

                SHA1

                84f87ce1213739e98d38d9878a535ec130dd2004

                SHA256

                e7f1abdf2fb4607f636e416b062f5b05a23aeba881a4f09a8083ca19a553811f

                SHA512

                3c355d3899100845d04be80b5537881e7ee5fd2516d4c2c89b3f2e511070c5455e8bee5dc6c6b71a0b55d6a9af6cd8a1f97fb4f46ce19a0a1412a5615340724e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gia.mui

                Filesize

                139KB

                MD5

                0f8a38c30c0a09f00eaf19395d8a40f2

                SHA1

                298afde1f0db4b527822370df772b7dc0371b92c

                SHA256

                aa12257d1c3ee82287d6c617359aaa2592f3bb9d0cca991f89660bb696ba8183

                SHA512

                ba89f3e76af52d7fb11e0d29c3e68a947611bcf3f18125c3ae2ba4538ff349c0fb13dac573bb3bb76cde231c464f623e266b34cdf58bd0321c96c856795a98be

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Giu.mui

                Filesize

                501B

                MD5

                c4f3aeb64246483fc44207f319c5b121

                SHA1

                b1ce99afe2e145d6e7a5d419c0b9e5614f680729

                SHA256

                0a718358ad31b418775f66874a055d4174f0f81326cd76513db2e086f908beeb

                SHA512

                deaf054f84f600b122bc7f2bd71e716fc05e0f2818cfe63b38573a9af7789ddd3134a1b2f796ff131ba1c7cd4bf74c82bd7d5136507288e872648fbe0ababd2a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com

                Filesize

                872KB

                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sento.mui

                Filesize

                872KB

                MD5

                84b0184010185fb22db4d7451492ae5f

                SHA1

                6f5a12664555342f958030c118db7e5b78d78d7d

                SHA256

                ddabd3d20c02f109925f46c56cba701f2bec2cffbe1f3800b2442a6cd4ab3d2d

                SHA512

                6d38495a4b85862787c7de720d2e0c71762202c770212cc91a389a8768b80fd920f52adf3e0bc0f8d81fedd15be95afa39d14c96a07617eb476908f088aec814

              • C:\Users\Admin\AppData\Local\Temp\nifsifq.vbs

                Filesize

                148B

                MD5

                9e22e079be50bc3a9bce6ebb256478bc

                SHA1

                1f8ffbf6bfa85e617144235fcf809869150e50bf

                SHA256

                7ed4fc0c163e66302c9b35b1592b8752729231daa755ecfcfa43c14cc385c895

                SHA512

                490d9c2e540f04bda6c242ae5adb9be9ec4deb7d4a0d0d30ef461b0adeaaca6f97c715b12fa8b8baee712f11e430d3499a5dea6f2522c0ccaeddb776689e7e8e

              • C:\Users\Admin\AppData\Local\Temp\nsg6FA3.tmp\UAC.dll

                Filesize

                14KB

                MD5

                adb29e6b186daa765dc750128649b63d

                SHA1

                160cbdc4cb0ac2c142d361df138c537aa7e708c9

                SHA256

                2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

                SHA512

                b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

              • C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe

                Filesize

                302KB

                MD5

                f795be6a5ce28f6e7f766e48dc5cb44e

                SHA1

                364b5b20afddd8f046bf3e673a5f590e2b84ceb1

                SHA256

                c7ad728ccbf4101c21bd646b604731764ab02d097b6cb35b251f5cd4dc3baf2a

                SHA512

                731d13194f146a7368e64407c03cef811043fc2ed68bcc1f941cacdcee21af933ee7b507bc16644476d55e992272ea3061650763eaf64b3c4dcb24eaab0c5543

              • C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe

                Filesize

                917KB

                MD5

                bbecb93aeacc1abf8cee9d9b91833900

                SHA1

                97d303be086f700918a9ddf4da58685961526738

                SHA256

                844922b5e7c0681325cfd27ece32c4c8a319c6054d4e2dd6d5b7f22ed31c22db

                SHA512

                af59d9ad84bc3381eb556f78d8578b76db145048fca4bfd48afa31cd03a54d75ae806f30b3f01207a5a75cf188735154c79dc5f494f5785a52b4868979150cc7

              • memory/824-53-0x0000000000400000-0x00000000023B6000-memory.dmp

                Filesize

                31.7MB

              • memory/824-36-0x0000000002700000-0x0000000002800000-memory.dmp

                Filesize

                1024KB

              • memory/824-37-0x00000000001C0000-0x00000000001E6000-memory.dmp

                Filesize

                152KB

              • memory/824-48-0x0000000000400000-0x00000000023B6000-memory.dmp

                Filesize

                31.7MB

              • memory/1808-58-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-55-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

                Filesize

                4KB

              • memory/1808-56-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-57-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-59-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-60-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-61-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-64-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/1808-79-0x0000000003B80000-0x0000000003BA7000-memory.dmp

                Filesize

                156KB

              • memory/4732-52-0x0000000000400000-0x00000000023B6000-memory.dmp

                Filesize

                31.7MB

              • memory/4732-63-0x0000000002450000-0x0000000002550000-memory.dmp

                Filesize

                1024KB

              • memory/4732-51-0x00000000001C0000-0x00000000001E6000-memory.dmp

                Filesize

                152KB

              • memory/4732-50-0x0000000002450000-0x0000000002550000-memory.dmp

                Filesize

                1024KB