Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:26

General

  • Target

    68d8f497a0e2e2f82ee88032704f1d0c_JaffaCakes118.msi

  • Size

    644KB

  • MD5

    68d8f497a0e2e2f82ee88032704f1d0c

  • SHA1

    86ba030ee943b15454400425d24d2cc00a131edf

  • SHA256

    6cefeb425e6aab734c4004fad897aa87e98b412ff711483d570a627d9261d211

  • SHA512

    69a021aba0cf976c9261c922122964f76ac77e6cdc791e9a1e569c301dc05e1b7785edac539ebd58824be964d5c0ecec7c68618826e7481eba3a482c70172d87

  • SSDEEP

    12288:4EL21et8tLEq3fizr2idCu1lTgn/IjLkD0Nv5BcALh7jZS+M1qDlEAJH1l+J1mI0:4EL+et8aqPizr2idCu1lTgn/IjLkD0Nt

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\68d8f497a0e2e2f82ee88032704f1d0c_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4764
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3264
    • C:\Windows\Installer\MSIE3A1.tmp
      "C:\Windows\Installer\MSIE3A1.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3868
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3144
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5164 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSIE3A1.tmp

      Filesize

      620KB

      MD5

      ea0b7599d700df709f54eda5951d2923

      SHA1

      eb83e674d00ace94b7f1974961d898d7952435ab

      SHA256

      380c32397e5833ac9baf11c267ac87f5d3a74a028c7377738583f9e82c99dcd3

      SHA512

      63307739a4112d4fec1ca43595f87f7ec87873332d03c775a11e18aa99d897372fc772a6741fc41aa6c3e4506f8ff1a3050d628cdf0fec8d343d0b38088c662e

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      dd5c19cb17c2b66319b4e066192ed642

      SHA1

      581f82aebbe6f513cae6e8147eacad23894b2700

      SHA256

      1c001f9182d00b08da762f43bbf6a3c0a2df53425752130479390ab1258b7a45

      SHA512

      7f3193fe12299ece1264421f1966ce4c35df71d622e917021374d0f7b62d54fb5eba9392f1fb3ac28cd95a17ea5c9e7b712096e7d6777f5aedfba30c027d4716

    • \??\Volume{d2bbef64-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{3bafbe7b-ea8b-4f41-85e6-059ad270bb32}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      28d7c0d39a7d136791070b51bf6f2e30

      SHA1

      174be9c3ecee488782dbef4e3627aff272dbd376

      SHA256

      0004c3ce26225712baec33d844da19c26a79e04a85c1db6114634ab7f1bb2bae

      SHA512

      6826b275f83fde07ceac316684786721842a4d4a95a0f6928c8a9436a0913af28f3cf05f562e90a5f31fb7807e1af0937ac2638091a938f08e512b50d7f8896c