Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 19:11

General

  • Target

    ee243a5d55da1ae9747db59ca1d32f2b_JaffaCakes118.exe

  • Size

    6.5MB

  • MD5

    ee243a5d55da1ae9747db59ca1d32f2b

  • SHA1

    f5b590379f316e40b61151c12490ddc83aa17dc5

  • SHA256

    a70325fd7314f54c43623316fcf8e7cb993570d8cab123a9e16ef7f5d5260309

  • SHA512

    4510176dd723ae3f95b21d6a1afe25639e9fa06d0e3e29f5093b7e26a395dbdf7ae6490ff08a6e1fdc21b269d9a961c9f52fd36ce276d15364b20cf77b956cb2

  • SSDEEP

    98304:/94Bxd7pLwwhfAqVo9Eo7bfkNxU+1Nhga4a/ZSm:/gdOwlhNqa4a/ZSm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee243a5d55da1ae9747db59ca1d32f2b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee243a5d55da1ae9747db59ca1d32f2b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ggfjgfguytdffdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jgffghjhgffghjgfd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ggfjgfguytdffdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jgffghjhgffghjgfd.exe"
        3⤵
        • Adds Run key to start application
        PID:3004
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jgffghjhgffghjgfd.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jgffghjhgffghjgfd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3944

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jgffghjhgffghjgfd.exe
    Filesize

    6.5MB

    MD5

    ee243a5d55da1ae9747db59ca1d32f2b

    SHA1

    f5b590379f316e40b61151c12490ddc83aa17dc5

    SHA256

    a70325fd7314f54c43623316fcf8e7cb993570d8cab123a9e16ef7f5d5260309

    SHA512

    4510176dd723ae3f95b21d6a1afe25639e9fa06d0e3e29f5093b7e26a395dbdf7ae6490ff08a6e1fdc21b269d9a961c9f52fd36ce276d15364b20cf77b956cb2

  • memory/1160-8-0x0000000006F10000-0x0000000006F76000-memory.dmp
    Filesize

    408KB

  • memory/1160-3-0x0000000005330000-0x00000000053C2000-memory.dmp
    Filesize

    584KB

  • memory/1160-10-0x0000000005300000-0x0000000005310000-memory.dmp
    Filesize

    64KB

  • memory/1160-11-0x0000000074E20000-0x00000000755D0000-memory.dmp
    Filesize

    7.7MB

  • memory/1160-5-0x0000000005DF0000-0x0000000005E8C000-memory.dmp
    Filesize

    624KB

  • memory/1160-6-0x0000000005300000-0x0000000005310000-memory.dmp
    Filesize

    64KB

  • memory/1160-7-0x0000000006E60000-0x0000000006E88000-memory.dmp
    Filesize

    160KB

  • memory/1160-0-0x0000000074E20000-0x00000000755D0000-memory.dmp
    Filesize

    7.7MB

  • memory/1160-9-0x0000000006EE0000-0x0000000006F02000-memory.dmp
    Filesize

    136KB

  • memory/1160-2-0x0000000005840000-0x0000000005DE4000-memory.dmp
    Filesize

    5.6MB

  • memory/1160-4-0x00000000053D0000-0x0000000005724000-memory.dmp
    Filesize

    3.3MB

  • memory/1160-12-0x0000000005300000-0x0000000005310000-memory.dmp
    Filesize

    64KB

  • memory/1160-13-0x0000000005300000-0x0000000005310000-memory.dmp
    Filesize

    64KB

  • memory/1160-1-0x00000000002D0000-0x000000000094A000-memory.dmp
    Filesize

    6.5MB

  • memory/1160-27-0x0000000074E20000-0x00000000755D0000-memory.dmp
    Filesize

    7.7MB

  • memory/3944-28-0x0000000074E20000-0x00000000755D0000-memory.dmp
    Filesize

    7.7MB

  • memory/3944-29-0x0000000005A60000-0x0000000005A70000-memory.dmp
    Filesize

    64KB

  • memory/3944-31-0x0000000074E20000-0x00000000755D0000-memory.dmp
    Filesize

    7.7MB