Analysis

  • max time kernel
    136s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 04:24

General

  • Target

    1f6ffbf88537755b91d44ef7f2adec54_JaffaCakes118.exe

  • Size

    15.9MB

  • MD5

    1f6ffbf88537755b91d44ef7f2adec54

  • SHA1

    e85536f40c73aa0293645bc0e61c4290af3a0b65

  • SHA256

    cc68c64d94ebdf8b1595358fafd3e08dfe0d7c8e545eb97dd7be4c8bdc82fc7b

  • SHA512

    bc0922aa3a79d6790c4c21b7c404d439233120772528ddcb96c390f276e91f9f162d6a490e02ee4bd963aa02ec15ed88e202e75155e02b1e41a593372fe8f161

  • SSDEEP

    393216:+/wVJkOBL+pielCMp6RY7x7SYxJoJuJpcPU0Rruuezx6:+amqL+pi2CUoSVqRzez

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 7 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f6ffbf88537755b91d44ef7f2adec54_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1f6ffbf88537755b91d44ef7f2adec54_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /F /IM UnrealCEFSubProcess.exe /T
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3712
      • C:\Windows\system32\taskkill.exe
        taskkill /F /IM UnrealCEFSubProcess.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2464
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /F /IM EpicGamesLauncher.exe /T
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Windows\system32\taskkill.exe
        taskkill /F /IM EpicGamesLauncher.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:5024
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop HTTPDebuggerPro
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\system32\sc.exe
        sc stop HTTPDebuggerPro
        3⤵
        • Launches sc.exe
        PID:4528
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /F /IM IPROSetMonitor.exe /T
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\system32\taskkill.exe
        taskkill /F /IM IPROSetMonitor.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2308
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /F /IM "Razer Synapse Service Process.exe" /T
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Windows\system32\taskkill.exe
        taskkill /F /IM "Razer Synapse Service Process.exe" /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:952
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /F /IM "Razer Synapse Service.exe" /T
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Windows\system32\taskkill.exe
        taskkill /F /IM "Razer Synapse Service.exe" /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\333d975b-78a7-46ce-aaa9-98c12a985d28\AgileDotNetRT64.dll

    Filesize

    75KB

    MD5

    42b2c266e49a3acd346b91e3b0e638c0

    SHA1

    2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

    SHA256

    adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

    SHA512

    770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

  • C:\Users\Admin\AppData\Local\Temp\evb43DA.tmp

    Filesize

    1KB

    MD5

    873e89965c183ad9c2bb55eed0622261

    SHA1

    57380dfdae3d91d49eb8988b3d0a0aad946584db

    SHA256

    4548fe128bc1ac730a805f7b57922a82b61999b9e3f6a6b0d5e0488015d2671f

    SHA512

    0ede0724fa3ccb965f769f3caf24f3a463bb444a55f0c04ad549225826436d1eee6112a313227941f50e4591924a904da51bf4461d2a12d62d7cfbe8325a1aa4

  • memory/3328-4-0x00000000001D0000-0x0000000002E78000-memory.dmp

    Filesize

    44.7MB

  • memory/3328-51-0x00000000001D0000-0x0000000002E78000-memory.dmp

    Filesize

    44.7MB

  • memory/3328-3-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-5-0x00000000001D0000-0x0000000002E78000-memory.dmp

    Filesize

    44.7MB

  • memory/3328-0-0x00000000001D0000-0x0000000002E78000-memory.dmp

    Filesize

    44.7MB

  • memory/3328-7-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-8-0x00000000001D0000-0x0000000002E78000-memory.dmp

    Filesize

    44.7MB

  • memory/3328-13-0x0000000002E80000-0x0000000002EBE000-memory.dmp

    Filesize

    248KB

  • memory/3328-14-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-27-0x0000000002EF0000-0x0000000002F14000-memory.dmp

    Filesize

    144KB

  • memory/3328-6-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-2-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-15-0x000002873D560000-0x000002873D58C000-memory.dmp

    Filesize

    176KB

  • memory/3328-32-0x0000000002F90000-0x0000000002FF6000-memory.dmp

    Filesize

    408KB

  • memory/3328-33-0x000002873D5D0000-0x000002873D5E6000-memory.dmp

    Filesize

    88KB

  • memory/3328-40-0x0000000003290000-0x000000000351E000-memory.dmp

    Filesize

    2.6MB

  • memory/3328-39-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-37-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-1-0x00007FFD9980D000-0x00007FFD9980E000-memory.dmp

    Filesize

    4KB

  • memory/3328-45-0x0000000003000000-0x00000000030B0000-memory.dmp

    Filesize

    704KB

  • memory/3328-50-0x0000028758240000-0x00000287582B6000-memory.dmp

    Filesize

    472KB

  • memory/3328-52-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-22-0x00007FFD8A660000-0x00007FFD8A7AE000-memory.dmp

    Filesize

    1.3MB