Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 14:21

General

  • Target

    ff79920aeb85abf9ef2a43d3c66fbbd9_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    ff79920aeb85abf9ef2a43d3c66fbbd9

  • SHA1

    2a0d4adbb5ae613c39d805c58059cb5b36c90b58

  • SHA256

    4aae041842ee6cc5e35654ac47bd92f2a50871b5fa0b7cbcde3379dcc0bae439

  • SHA512

    4fff9e1d08254e24366821aca4d19019e37080753022ec48cd06e7750f544f24abb0bce5420f106610cfeaa9e022f6356ba7ed414b48f58213f271b21d8c72c8

  • SSDEEP

    6144:/R2zP+yfL/mANMXA41RSNxknB6jMJP/uMJAgdLuRbs+AB:Qzbm4MXm9yGUAgdyRVS

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 11 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff79920aeb85abf9ef2a43d3c66fbbd9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff79920aeb85abf9ef2a43d3c66fbbd9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\QvodSetupPlus3.exe
      "C:\QvodSetupPlus3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3704
    • C:\SETUP.EXE
      "C:\SETUP.EXE"
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:3180
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
      PID:4324
    • C:\Windows\SysWOW64\Svchost.exe
      C:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
      1⤵
      • Loads dropped DLL
      PID:2740

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\QvodSetupPlus3.exe
      Filesize

      175KB

      MD5

      fbaccb13d85578d7d8f01c3b09abf6e1

      SHA1

      a43ed3d60e1525e56c46b1bdc3652069180efc7c

      SHA256

      c2abe4872bd733300c76b04c3fc8974d84d21ddcea6bdc3e4473774363f488b8

      SHA512

      d3ecebeabcad1ca1a53341ab4764509917a82cde573c1db58d3039298d99cc0f22e805a0c73b7cac1d1a9da03b5ed18766fded1b9356242908843231d9351b83

    • C:\SETUP.EXE
      Filesize

      90KB

      MD5

      27433065053ccc774920423d55d58694

      SHA1

      64c594583c60170b495d5a6f68111aab275c54d5

      SHA256

      460c07bb418b2c224187de061333e64300215bc37ad59dfc3b61ddefc82c8bb3

      SHA512

      acf8353a7a56c24674ffbb4264c06ebd8d8d1f3bb92e00cd6ffdcd3ce7112558fd7d98e0d8f5038cb4107774dca3a58a338b6c952cc8bc8108f1c50568aad30b

    • C:\Users\Infortmp.txt
      Filesize

      980B

      MD5

      3fe98ad658f4a74a3566379cd00cce19

      SHA1

      9745634e3bb3de689c5d6440c60325846d4e1fab

      SHA256

      97824101b6b3fd949a01aef6edb354bb67659db6ffe6d0ccd6695bf9d6538818

      SHA512

      3dcf5110d2925a38e9987ac923fbf90abf8c35ba4cebc0e95d32b811bc3095124e3b33f7f3e93300b4121a726ac0a4088282b4e30723cade0657dd95e1e7c1cc

    • C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll
      Filesize

      90KB

      MD5

      ed6e695d463a888627342a9e8e9d7702

      SHA1

      9cc5e56633d0b9b7c2168afbc78d7cf6f265e58a

      SHA256

      da761aebbdaf212a5e2168768bc805b4f7577733c54312cb2566b807ca4a0bec

      SHA512

      09420dcb848d666fb242d7f5d610c8150deef8be9533c26fdcecf491f933ac58c6751698cc85783dee071bc47c4bf34d3dbbc37034b7a198248b540dc28a9c15

    • memory/2740-45-0x0000000075220000-0x0000000075254000-memory.dmp
      Filesize

      208KB

    • memory/2740-42-0x0000000075220000-0x0000000075254000-memory.dmp
      Filesize

      208KB

    • memory/2740-43-0x0000000075220000-0x0000000075254000-memory.dmp
      Filesize

      208KB

    • memory/2740-41-0x0000000075220000-0x0000000075254000-memory.dmp
      Filesize

      208KB

    • memory/3180-29-0x0000000077CE2000-0x0000000077CE3000-memory.dmp
      Filesize

      4KB

    • memory/3180-22-0x0000000000170000-0x00000000001A4000-memory.dmp
      Filesize

      208KB

    • memory/3180-32-0x0000000076070000-0x0000000076095000-memory.dmp
      Filesize

      148KB

    • memory/3180-47-0x0000000076070000-0x0000000076095000-memory.dmp
      Filesize

      148KB

    • memory/3180-36-0x0000000000170000-0x00000000001A4000-memory.dmp
      Filesize

      208KB

    • memory/3180-30-0x0000000077CE2000-0x0000000077CE3000-memory.dmp
      Filesize

      4KB

    • memory/3180-25-0x0000000000170000-0x00000000001A4000-memory.dmp
      Filesize

      208KB

    • memory/3180-23-0x0000000000170000-0x00000000001A4000-memory.dmp
      Filesize

      208KB

    • memory/3180-24-0x0000000000170000-0x00000000001A4000-memory.dmp
      Filesize

      208KB

    • memory/3180-31-0x0000000077CE3000-0x0000000077CE4000-memory.dmp
      Filesize

      4KB

    • memory/3704-18-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-35-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-48-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-50-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-52-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-53-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-55-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-57-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-58-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB

    • memory/3704-60-0x0000000000400000-0x0000000000455000-memory.dmp
      Filesize

      340KB