Analysis

  • max time kernel
    140s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 17:16

General

  • Target

    fac9d53be590b02596ff4f6e1ba1e5d2_JaffaCakes118.exe

  • Size

    4.4MB

  • MD5

    fac9d53be590b02596ff4f6e1ba1e5d2

  • SHA1

    0560dba975f26904783321ac88144ccfbccd5316

  • SHA256

    c3dfd2b724b845e9afa632960d7d9c1e77d2b18c98dc8cfc176c8a3cd46d7d57

  • SHA512

    ef4eb024f047ce57c228f284b9d433d284667711d7dd855ddac2b6c5948e7f6d99ca9b39e994dabc34dcc1730fdc8005e7f7848de61054641a4c8c1cede7d07b

  • SSDEEP

    98304:FhOx/3z85tCuMSL4dBqAgMYQYikxzeR6b/r6w16/6qZV8Nlwbv2X:FhOx/3z82q5hxBufyqSOO

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fac9d53be590b02596ff4f6e1ba1e5d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fac9d53be590b02596ff4f6e1ba1e5d2_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\7za.exe
      "C:\Users\Admin\AppData\Local\Temp\\7za.exe" x "C:\Users\Admin\AppData\Local\Temp\\downloader.7z" -o"C:\Users\Admin\AppData\Local\Temp\" -aoa
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3992
    • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
      "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2596
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4612 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1180

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Defense Evasion

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7za.exe
      Filesize

      736KB

      MD5

      ea1ee87d7eb2d36ba9fdcf24263cd528

      SHA1

      ff22c6ac17187c0af8155000d1937cd6f5a5b34d

      SHA256

      9706c2ddd91e24317de3ba2f0c3deddf5424384e32b2cfd39ffd3a74c05f5ff9

      SHA512

      2f31f9c47fbaa97a994e1dcb149921d515ad2408ee0fa0a016e5e173569b96ef27e2cfd5af4e86e622276e509dea3fdff8469284d60a69ee270c35100b7422cc

    • C:\Users\Admin\AppData\Local\Temp\DlMgr.dll
      Filesize

      181KB

      MD5

      1341d73573697c6af12d21911f913511

      SHA1

      d48fedeea2cc8c60c3518af8741c7c9b0bad4f32

      SHA256

      295dcdb341098c8f1e402845b02d158cfe8543acfe651c06ce5e1845bead7b03

      SHA512

      d937cfbbfc2b3252b7c078d7a0ae91a06fe4495dd9ebb116c5c68302f8819d71a3f8d0a017e31ef4447d7aa758f450873ddd3c36237bd3aea470aba68652c0bf

    • C:\Users\Admin\AppData\Local\Temp\download\ATL71.DLL
      Filesize

      87KB

      MD5

      79cb6457c81ada9eb7f2087ce799aaa7

      SHA1

      322ddde439d9254182f5945be8d97e9d897561ae

      SHA256

      a68e1297fae2bcf854b47ffa444f490353028de1fa2ca713b6cf6cc5aa22b88a

      SHA512

      eca4b91109d105b2ce8c40710b8e3309c4cc944194843b7930e06daf3d1df6ae85c1b7063036c7e5cd10276e5e5535b33e49930adbad88166228316283d011b8

    • C:\Users\Admin\AppData\Local\Temp\download\MSVCR71.dll
      Filesize

      340KB

      MD5

      ca2f560921b7b8be1cf555a5a18d54c3

      SHA1

      432dbcf54b6f1142058b413a9d52668a2bde011d

      SHA256

      c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb

      SHA512

      23e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e

    • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
      Filesize

      258KB

      MD5

      a83ef2375ccc10030e64508e1a802ad4

      SHA1

      58f46307be974f0e2ed2e9115bc1243ba6538e3c

      SHA256

      e3bf11413cefdcd810f047061e70f06a422e22fb36ee66007336c3b28cb073b3

      SHA512

      c6995312041e14b81a63690e2accb7c9e209ecaae092ab8f381d3cfef9be815b0cd07f19a1279ee18b0da96e0fa9ae6efd24ae053215e96d34c4fcd7d8d62f67

    • C:\Users\Admin\AppData\Local\Temp\download\XLBugHandler.dll
      Filesize

      98KB

      MD5

      92154e720998acb6fa0f7bad63309470

      SHA1

      385817793b9f894ca3dd3bac20b269652df6cbc6

      SHA256

      1845df41da539bca264f59365bf7453b686b9098cc94cd0e2b9a20c74a561096

      SHA512

      37ba81f338af7de7ef2ac6bcf67b3aec96f9b748830ee3c0b152029871f7701e917b94a6b51acd7be6f8f02aea2b25f3b14ced1a218bf4868af04f5207bb5fff

    • C:\Users\Admin\AppData\Local\Temp\download\XLBugReport.exe
      Filesize

      242KB

      MD5

      67c767470d0893c4a2e46be84c9afcbb

      SHA1

      00291089b13a93f82ee49a11156521f13ea605cd

      SHA256

      64f8d68cc1cfc5b9cc182df3becf704af93d0f1cc93ee59dbf682c75b6d4ffc0

      SHA512

      d5d3a96dec616b0ab0cd0586fa0cc5a10ba662e0d5e4de4d849ac62ca5d60ec133f54d109d1d130b5f99ae73e7abfb284ec7d5ba55dca1a4f354c6af73c00e35

    • C:\Users\Admin\AppData\Local\Temp\download\dl_peer_id.dll
      Filesize

      89KB

      MD5

      dba9a19752b52943a0850a7e19ac600a

      SHA1

      3485ac30cd7340eccb0457bca37cf4a6dfda583d

      SHA256

      69a5e2a51094dc8f30788d63243b12a0eb2759a3f3c3a159b85fd422fc00ac26

      SHA512

      a42c1ec5594c6f6cae10524cdad1f9da2bdc407f46e685e56107de781b9bce8210a8cd1a53edacd61365d37a1c7ceba3b0891343cf2c31d258681e3bf85049d3

    • C:\Users\Admin\AppData\Local\Temp\download\download_engine.dll
      Filesize

      3.2MB

      MD5

      3c2b7b3ff7de18fe47a77b712ff00a00

      SHA1

      6d1768acfdee1efb942ef3c28934e127659125ef

      SHA256

      4360f3b0dc6ae9aa5b7fb6a6e170e09505bf01df3e42846f2e5270d186f9fa06

      SHA512

      6a795af49d14bcd8fb37a2d36788e226f0f4a040a46c7bbb683fc2b8f4eb18d60b992ea414a89f4ed8020c6b2235c1e490e2924b935e24649a81f890ae78cfce

    • C:\Users\Admin\AppData\Local\Temp\download\id.dat
      Filesize

      44B

      MD5

      86092aebe0515cc017bc94d41ec484d7

      SHA1

      faf2ae219e716bb657a9efe7e110a505a669acc9

      SHA256

      f777dbd890ca94566d95d21d0398bff7c52f2d8c8825218322910d7b913687ce

      SHA512

      bce95deabef04d2c3ebf85fa8ea9b2a2739bbac89d803316273cfb56dc08b5090d91b20296363b0ccfd427bc7448a717393490f3b11b50420c03c7cf918b0323

    • C:\Users\Admin\AppData\Local\Temp\download\msvcp71.dll
      Filesize

      492KB

      MD5

      a94dc60a90efd7a35c36d971e3ee7470

      SHA1

      f936f612bc779e4ba067f77514b68c329180a380

      SHA256

      6c483cbe349863c7dcf6f8cb7334e7d28c299e7d5aa063297ea2f62352f6bdd9

      SHA512

      ff6c41d56337cac074582002d60cbc57263a31480c67ee8999bc02fc473b331eefed93ee938718d297877cf48471c7512741b4aebc0636afc78991cdf6eddfab

    • C:\Users\Admin\AppData\Local\Temp\download\zlib1.dll
      Filesize

      58KB

      MD5

      89f6488524eaa3e5a66c5f34f3b92405

      SHA1

      330f9f6da03ae96dfa77dd92aae9a294ead9c7f7

      SHA256

      bd29d2b1f930e4b660adf71606d1b9634188b7160a704a8d140cadafb46e1e56

      SHA512

      cfe72872c89c055d59d4de07a3a14cd84a7e0a12f166e018748b9674045b694793b6a08863e791be4f9095a34471fd6abe76828dc8c653be8c66923a5802b31e

    • C:\Users\Admin\AppData\Local\Temp\downloader.7z
      Filesize

      1.5MB

      MD5

      50a4726d12aed1ccea812c928f625cc6

      SHA1

      7adc625d70adbc685d7363cafcd9781ea7fbbc11

      SHA256

      f8efe43c4635d278041d4c41f098827ab79189c16df93203a5f13c31d5019527

      SHA512

      f2140c1cd49b56a170aef22267f2621c8d790b3cd95f4d53c5448bf5b029d6b673bbb3ff4477699a59c2405019e63741d16724a655f0c1284c852a0bd0909e61

    • C:\Users\Admin\AppData\Local\Temp\xldl.dll
      Filesize

      242KB

      MD5

      e914a9df187d217c0a1715eaba4eec2a

      SHA1

      db662eab8b2da3bf56821ec23b0c2ed1dc8d9b63

      SHA256

      95934dae479fc68db1e6cc4517ca0bbd5a72b4fc299062cf4033b87f7fe03660

      SHA512

      996e1de053b588b3a8b9e6fb1c8cd3d2fad9c7f26b4a13c486ec95f4fa00aadbba42af2781678aaddbef872fdbb9e7c3d6c02c72b3d8c3833be3e4b007b73818

    • C:\Users\Admin\AppData\Local\Temp\~DF9D27.tmp
      Filesize

      1KB

      MD5

      3262169c2df654611e840135f263b608

      SHA1

      1bf617616b84713f57d35698acc21146ab5714e7

      SHA256

      a11565c647fd230626a41dd13e96b94f14a7dc3745836e120efbeb454213f281

      SHA512

      adf48352a93a0d43ebd022db2ff1960608bcc03fe1c949f66489f92792d5557467beaf70ded1417b4132449679d81bf0074b9900ba24e1f99828b6557810ceff

    • C:\Users\Admin\AppData\Roaming\youxi_gjol_downloader\config.ini
      Filesize

      238B

      MD5

      91fd6b5856eed72126fc8412a4cd5bab

      SHA1

      e2d13b020b1cde017aacee0e9c8dd29337de8d35

      SHA256

      b58bb66fb3490d9d7bab80c485d41db493bd3b0b5f968b79d7b249ce7941bc5c

      SHA512

      cff4327560694bd060e36b40bee0afd02286b3b9e4fc8949f9b2ed657381bb9599bed3db6118fd6b1494916dfff73673a5e2fd4d6b5b281fae9d64c3fdb58d84

    • C:\Users\Admin\AppData\Roaming\youxi_gjol_downloader\skin\skin.sk
      Filesize

      539KB

      MD5

      02c16754cef237c180a8dc2e1eef934a

      SHA1

      b97881f8e621952e71d96f5816e623af4a037e55

      SHA256

      48246af06eb4e33ade0d615e5d91fdd706ec1c67f9f303d27b26bbc844639bc3

      SHA512

      6e3d24b83cc51eff1246cf59550aeff5ac9c1b4ffd43843995b62b8293946dca5ffc36732aab215d6280f1c034d8c869469983e6751646d4ede10b92f569f466

    • memory/2596-67-0x000000006FFF0000-0x0000000070000000-memory.dmp
      Filesize

      64KB

    • memory/2596-71-0x0000000002730000-0x0000000002A6E000-memory.dmp
      Filesize

      3.2MB

    • memory/2596-55-0x0000000000400000-0x0000000000454000-memory.dmp
      Filesize

      336KB

    • memory/2596-82-0x0000000000400000-0x0000000000454000-memory.dmp
      Filesize

      336KB