Analysis

  • max time kernel
    149s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 00:24

General

  • Target

    01fed012786da9458880cd8ad023ccab_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    01fed012786da9458880cd8ad023ccab

  • SHA1

    b10c8f3c7c7a5b71bf958359c5b4da54a5a98056

  • SHA256

    0e82c3446ead43c5802479045460e6d8db1229c10a9620e68e6ab828d4b17fff

  • SHA512

    2be3676cf86458574db17c62420020cdf2d4aa82621c5dec640a300a998180cab8fa3cc6011dda7c6b0122895c513d7aa718e564dbe3193a9dca64f9b4e2b54c

  • SSDEEP

    49152:kJxNHabdDlGc/za1rlFQFigZL+l63UBU3EWttCwYXn6CQqilfG1M3FB:kOLa1ZFU6l0YU3l3QCjgMVB

Malware Config

Signatures

  • Renames multiple (219) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\01fed012786da9458880cd8ad023ccab_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\01fed012786da9458880cd8ad023ccab_JaffaCakes118.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4976
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4600
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a378B.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4268
            • C:\Users\Admin\AppData\Local\Temp\01fed012786da9458880cd8ad023ccab_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\01fed012786da9458880cd8ad023ccab_JaffaCakes118.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              PID:2476
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1396
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4448
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4656
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:516
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:5012

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          2
          T1112

          Credential Access

          Unsecured Credentials

          1
          T1552

          Credentials In Files

          1
          T1552.001

          Discovery

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx
            Filesize

            1.5MB

            MD5

            230c8f87850fd67b6b3024da50f360bb

            SHA1

            f3a629ece2b85aee9a88b3caebc54ac66053330a

            SHA256

            3b30b5a1a4561ce2ef9b7fd0f2aa97e533f35c2bdbdb534995cc44066ae0f90a

            SHA512

            5dfdedebe4a0e3843d68a3d93a44e54979f8a637902f499c278b5bb91c3a61561f3ed5de510c54405dd4f093128b9b69e175f6b63f9be2b000bbe381f6a2c3eb

          • C:\Program Files\CompareUndo.exe.Exe
            Filesize

            802KB

            MD5

            7ad0d12028368959378bb78136a1b902

            SHA1

            985e54fe919d19a6828c953ef756398730885ac5

            SHA256

            5ff1f06d320611e67022ed105d65a0ff4f1131e9f9d23eac96a38fc2b342adf1

            SHA512

            2e108a6fe6e43db73485e394c7a10f29b06868f2fa424b9376bb21cdcc189bbdfcbe2cbed5630706d74171aa5ea069549e6c398e36c9a144be8fec3737154564

          • C:\Users\Admin\AppData\Local\Temp\$$a378B.bat
            Filesize

            614B

            MD5

            1da0c8d5bf58b7bf2563ba9e1d8cc2f8

            SHA1

            d9c1ca5c7819838321047036eff8c3f671e0a388

            SHA256

            5e169d04ed12228c55927529813b3f6fbe3b4149935cb0ca24fa96d14dcd0125

            SHA512

            7cc0bc0ead721dd792ccd2311d63d62f9368bc12990633a190f9ffdd9e62a3e6ce4a408fa1195b2c75a9c3990807347c11f10363900568aabae6af628e8c6ccc

          • C:\Users\Admin\AppData\Local\Temp\01fed012786da9458880cd8ad023ccab_JaffaCakes118.exe.exe
            Filesize

            2.3MB

            MD5

            cee0d7092ec83373078d0045a0c74c40

            SHA1

            74359367f95990e189e485cac12532a5bf1053bb

            SHA256

            99658a950b0acbee61b56609690efd98b8c3a5b2dfa09eb47cca3ef31d8cdb77

            SHA512

            73f48e633735acc4098a5b85be4792db8c979ab5ba39eb6d67e971064f8d6b903c71e86cef027a0d96d50f5dd2eddc89f257a77a3007bdee82af683df6461ad0

          • C:\Windows\Logo1_.exe
            Filesize

            54KB

            MD5

            68d9f79334a728b64d4fb7118ca9ed44

            SHA1

            68fd2b791a55cfc8ae6a59fd0c710016e7ddae68

            SHA256

            cd5d6a9067696241fc09aed06561bf2f57ec3a7547e06a0924b1e1e68279b783

            SHA512

            e9859b0a6f8ce15c9935a7b2f68087f0347ce19ea58eb31f31e697889a14a43ec5547649c1ad085adecdb5cb78fa35514e47653a341240c0fd20aa8970bbce58

          • C:\Windows\system32\drivers\etc\hosts
            Filesize

            842B

            MD5

            6f4adf207ef402d9ef40c6aa52ffd245

            SHA1

            4b05b495619c643f02e278dede8f5b1392555a57

            SHA256

            d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

            SHA512

            a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

          • memory/1396-12-0x0000000000400000-0x000000000043C000-memory.dmp
            Filesize

            240KB

          • memory/1396-39-0x0000000000400000-0x000000000043C000-memory.dmp
            Filesize

            240KB

          • memory/2308-1-0x0000000000510000-0x0000000000530000-memory.dmp
            Filesize

            128KB

          • memory/2308-10-0x0000000000400000-0x000000000043C000-memory.dmp
            Filesize

            240KB

          • memory/2308-0-0x0000000000400000-0x000000000043C000-memory.dmp
            Filesize

            240KB

          • memory/2476-17-0x00000000008C0000-0x00000000008C1000-memory.dmp
            Filesize

            4KB

          • memory/2476-38-0x0000000000400000-0x00000000006F2000-memory.dmp
            Filesize

            2.9MB

          • memory/2476-23-0x0000000073F30000-0x0000000074430000-memory.dmp
            Filesize

            5.0MB

          • memory/2476-40-0x0000000073F30000-0x0000000074430000-memory.dmp
            Filesize

            5.0MB

          • memory/2476-42-0x0000000002C80000-0x0000000002C81000-memory.dmp
            Filesize

            4KB

          • memory/2476-16-0x0000000000400000-0x00000000006F2000-memory.dmp
            Filesize

            2.9MB