Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 03:29

General

  • Target

    3db836ed96f78d4973f3a4378fd14ff3_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    3db836ed96f78d4973f3a4378fd14ff3

  • SHA1

    83ed2e829f3a144efc9155351c5bee95ac9806bb

  • SHA256

    059ef3149d0f85af58acdcf8f40ba36a01a896242d88bf8de1683fcb2601e4e0

  • SHA512

    a5cf923e4f8302778354e5b91ce267f00f32a7910995177031489c097bea10c237bd8d3d3a6ef175f3455be4fa013600ef3952f97a8a9b729cbd785771a84625

  • SSDEEP

    24576:nbSaE4mvt/Z79+k6U2JLkIwZhlqoOl/HODurbrgL:nbSv4mvzZB6Ublq7/HOKrQL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db836ed96f78d4973f3a4378fd14ff3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3db836ed96f78d4973f3a4378fd14ff3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\1431367319.exe
        C:\Users\Admin\AppData\Local\Temp\1431367319.exe 9)1)8)6)1)5)6)1)0)5)5 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
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657382.txt bios get serialnumber
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2560
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657382.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3140
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657382.txt bios get version
          4⤵
            PID:984
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657382.txt bios get version
            4⤵
              PID:3316
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657382.txt bios get version
              4⤵
                PID:2716
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 948
                4⤵
                • Program crash
                PID:1632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2944 -ip 2944
          1⤵
            PID:208
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:3552

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1431367319.exe

              Filesize

              788KB

              MD5

              9127080ebba1d3ca64bd5bbacd179d80

              SHA1

              50c1e3c22d5ccb063d56c6d4a3c8ea43fb9b23a8

              SHA256

              c10ddbd43ea745d5e0a255db3c4eb441f03676d440239fc0ae5d89b1e9e89c66

              SHA512

              4e25a6f6cfee901f99c1b0724334e3915ede7950c495fd034b29232852e6ed9967cd446565d239257300be44cdeb32133e82a47d1b989053ec8c7f3fc5426cf0

            • C:\Users\Admin\AppData\Local\Temp\81715657382.txt

              Filesize

              66B

              MD5

              9025468f85256136f923096b01375964

              SHA1

              7fcd174999661594fa5f88890ffb195e9858cc52

              SHA256

              d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

              SHA512

              92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

            • C:\Users\Admin\AppData\Local\Temp\81715657382.txt

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Local\Temp\81715657382.txt

              Filesize

              58B

              MD5

              dd876faf0fd44a5fab3e82368e2e8b15

              SHA1

              01b04083fa278dda3a81705ca5abcfee487a3c90

              SHA256

              5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

              SHA512

              e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

            • C:\Users\Admin\AppData\Local\Temp\File.exe

              Filesize

              581KB

              MD5

              3cd4d44d420f747cc484c84979c0b6e8

              SHA1

              0733c1e45d63a17d03a23bae6bda6a99728a0197

              SHA256

              1935cc5b6f2efbd3e9c0f4fa59ef2f0d6f4624dc88d29f022b3923441d89c830

              SHA512

              d1d0d379627cc5a0363c3b327c1854ebeb126385dcba1fcdc0b4ec1f8e7ef6afccc7ecbfae617e4eed82a6893bd8a7a0dd39d75e6af39612bec36a57ac0f00e8

            • C:\Users\Admin\AppData\Local\Temp\nse28E1.tmp\beasvwu.dll

              Filesize

              153KB

              MD5

              c8d0bb6d01ce9fd845bafa95d23b9815

              SHA1

              03216c5b333e06dd283c7b4b4e59f0d24574010e

              SHA256

              b356f45e360d75eac5ed02b3fc1dbbcd52ce89c622f35d9ab238c154888fda85

              SHA512

              c19501b059c9e523cb72afbe4545fa420450db45ff5502073a2a21f328a2101250ba11ce1c4e18caa6b39ac4be218a98b63903c98851133bced30f154e7d3155

            • C:\Users\Admin\AppData\Local\Temp\nse28E1.tmp\nsisunz.dll

              Filesize

              40KB

              MD5

              5f13dbc378792f23e598079fc1e4422b

              SHA1

              5813c05802f15930aa860b8363af2b58426c8adf

              SHA256

              6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

              SHA512

              9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

            • memory/4444-0-0x00007FFFA5655000-0x00007FFFA5656000-memory.dmp

              Filesize

              4KB

            • memory/4444-1-0x00007FFFA53A0000-0x00007FFFA5D41000-memory.dmp

              Filesize

              9.6MB

            • memory/4444-2-0x00007FFFA53A0000-0x00007FFFA5D41000-memory.dmp

              Filesize

              9.6MB

            • memory/4444-18-0x000000001BD40000-0x000000001BDB8000-memory.dmp

              Filesize

              480KB

            • memory/4444-93-0x00007FFFA53A0000-0x00007FFFA5D41000-memory.dmp

              Filesize

              9.6MB