Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:26

General

  • Target

    68d8f497a0e2e2f82ee88032704f1d0c_JaffaCakes118.msi

  • Size

    644KB

  • MD5

    68d8f497a0e2e2f82ee88032704f1d0c

  • SHA1

    86ba030ee943b15454400425d24d2cc00a131edf

  • SHA256

    6cefeb425e6aab734c4004fad897aa87e98b412ff711483d570a627d9261d211

  • SHA512

    69a021aba0cf976c9261c922122964f76ac77e6cdc791e9a1e569c301dc05e1b7785edac539ebd58824be964d5c0ecec7c68618826e7481eba3a482c70172d87

  • SSDEEP

    12288:4EL21et8tLEq3fizr2idCu1lTgn/IjLkD0Nv5BcALh7jZS+M1qDlEAJH1l+J1mI0:4EL+et8aqPizr2idCu1lTgn/IjLkD0Nt

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\68d8f497a0e2e2f82ee88032704f1d0c_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1796
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\Installer\MSI452D.tmp
      "C:\Windows\Installer\MSI452D.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1680
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2088
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B8" "000000000000055C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI452D.tmp

    Filesize

    620KB

    MD5

    ea0b7599d700df709f54eda5951d2923

    SHA1

    eb83e674d00ace94b7f1974961d898d7952435ab

    SHA256

    380c32397e5833ac9baf11c267ac87f5d3a74a028c7377738583f9e82c99dcd3

    SHA512

    63307739a4112d4fec1ca43595f87f7ec87873332d03c775a11e18aa99d897372fc772a6741fc41aa6c3e4506f8ff1a3050d628cdf0fec8d343d0b38088c662e