Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2024 03:31

General

  • Target

    0b028c59462504f316fdd978e96ca852_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    0b028c59462504f316fdd978e96ca852

  • SHA1

    221e13e8770f55e45fb12ed9c6249a37b2c82f9a

  • SHA256

    8004e7a720dba922a3fa5a956bfef9d8189b02ff2f72d1a66421ececd8245811

  • SHA512

    dd89c41f6eb9a2a34bc0ad540f87979f3578a643f20a2c3d8609ee9ce739a83819b0e0fd5f008870c9504f3072523ca074b85fc1cae0c06a41d6bf6fac0a6b43

  • SSDEEP

    12288:iLWzQWmzgFsw/vf8uzFwxCyEFKFHeSJ7zdGT0Lb2ZoF9Mt8:iL0pYgF7E0FOCyGKNeSJ7zdGgXIt8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NTFS ADS 7 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b028c59462504f316fdd978e96ca852_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b028c59462504f316fdd978e96ca852_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\0b028c59462504f316fdd978e96ca852_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\0b028c59462504f316fdd978e96ca852_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:5932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Temp\mshtemp.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Users\Admin\AppData\Local\Temp\mshtemp.exe
        "C:\Users\Admin\AppData\Local\Temp\mshtemp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\mshtemp.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:5820
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\mshtemp.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:2440
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\mshtemp.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe"
          4⤵
          • NTFS ADS
          PID:3084
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe"
            5⤵
            • Checks computer location settings
            • Drops startup file
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4568
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:5128
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:3396
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SmrtAdpt.exe"
              6⤵
              • Executes dropped EXE
              PID:4368
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4044 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SmrtAdpt.exe.log

      Filesize

      990B

      MD5

      670197b869fee7078de7a8cec64e27c2

      SHA1

      756e684c50cd3961640fcbeb96d588ad574b1b64

      SHA256

      2cdf8443cfe2823ccd05149ed1953e60c0de6c87f0d62146ad5be26b6657c87c

      SHA512

      21cd9e7eec27d8c9d103014445070bed0939a7521daa8f8b966e46f381932ecaa0704f8e0ab5d0cff8e543c08d3376cefe9aea7ce7e103dee637e45e027eff0e

    • C:\Users\Admin\AppData\Local\Temp\mshtemp.exe

      Filesize

      1.5MB

      MD5

      0b028c59462504f316fdd978e96ca852

      SHA1

      221e13e8770f55e45fb12ed9c6249a37b2c82f9a

      SHA256

      8004e7a720dba922a3fa5a956bfef9d8189b02ff2f72d1a66421ececd8245811

      SHA512

      dd89c41f6eb9a2a34bc0ad540f87979f3578a643f20a2c3d8609ee9ce739a83819b0e0fd5f008870c9504f3072523ca074b85fc1cae0c06a41d6bf6fac0a6b43

    • memory/1320-24-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1320-22-0x0000000002570000-0x0000000002580000-memory.dmp

      Filesize

      64KB

    • memory/1320-18-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1320-17-0x0000000002570000-0x0000000002580000-memory.dmp

      Filesize

      64KB

    • memory/1320-16-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3296-7-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3296-3-0x0000000005020000-0x000000000504C000-memory.dmp

      Filesize

      176KB

    • memory/3296-9-0x00000000052D0000-0x00000000052F2000-memory.dmp

      Filesize

      136KB

    • memory/3296-10-0x00000000063D0000-0x0000000006974000-memory.dmp

      Filesize

      5.6MB

    • memory/3296-11-0x0000000005180000-0x000000000518C000-memory.dmp

      Filesize

      48KB

    • memory/3296-12-0x00000000052A0000-0x00000000052A6000-memory.dmp

      Filesize

      24KB

    • memory/3296-14-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3296-0-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3296-6-0x0000000005470000-0x0000000005632000-memory.dmp

      Filesize

      1.8MB

    • memory/3296-5-0x0000000005230000-0x0000000005296000-memory.dmp

      Filesize

      408KB

    • memory/3296-4-0x00000000051B0000-0x00000000051C0000-memory.dmp

      Filesize

      64KB

    • memory/3296-8-0x0000000005160000-0x000000000516A000-memory.dmp

      Filesize

      40KB

    • memory/3296-2-0x00000000050C0000-0x0000000005152000-memory.dmp

      Filesize

      584KB

    • memory/3296-1-0x00000000005D0000-0x000000000074A000-memory.dmp

      Filesize

      1.5MB

    • memory/4368-31-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/4368-35-0x00000000058F0000-0x0000000005900000-memory.dmp

      Filesize

      64KB

    • memory/4368-36-0x0000000005960000-0x0000000005A0E000-memory.dmp

      Filesize

      696KB

    • memory/4368-37-0x0000000008EB0000-0x0000000008ED8000-memory.dmp

      Filesize

      160KB

    • memory/4368-38-0x00000000081B0000-0x00000000081C8000-memory.dmp

      Filesize

      96KB

    • memory/4368-39-0x0000000008210000-0x0000000008226000-memory.dmp

      Filesize

      88KB

    • memory/4568-30-0x00000000071E0000-0x000000000727C000-memory.dmp

      Filesize

      624KB

    • memory/4568-29-0x0000000006660000-0x000000000666C000-memory.dmp

      Filesize

      48KB