Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 14:02

General

  • Target

    7d39468c9c7a5e722cdf752071865924_JaffaCakes118.exe

  • Size

    586KB

  • MD5

    7d39468c9c7a5e722cdf752071865924

  • SHA1

    9b5ba1e2fa3ddad0966fd404c0a01b6be7f2359d

  • SHA256

    102f3f47b7babe90ea9d6af0913c4036931ec86e2a7c6edd6bce415ed8286cfb

  • SHA512

    1e03e8703b72d6ee729895973296d1e5d333089c19efb35bc5850fe43df70bd4c82a77475d0cc0ab427ee1ef5e471148e62296392eead508f14b49df93c2a7ce

  • SSDEEP

    12288:yjWshi3UvdHNc5JQA2ur1e1ckv4y4TWKH2cgqUe:yjdzI5JXWX8C3HqN

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d39468c9c7a5e722cdf752071865924_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7d39468c9c7a5e722cdf752071865924_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\7d39468c9c7a5e722cdf752071865924_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\7d39468c9c7a5e722cdf752071865924_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\ProgramData\128946\repair.exe
        "C:\ProgramData\128946\repair.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\ProgramData\128946\repair.exe
          "C:\ProgramData\128946\repair.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\128946\repair.exe
    Filesize

    586KB

    MD5

    7d39468c9c7a5e722cdf752071865924

    SHA1

    9b5ba1e2fa3ddad0966fd404c0a01b6be7f2359d

    SHA256

    102f3f47b7babe90ea9d6af0913c4036931ec86e2a7c6edd6bce415ed8286cfb

    SHA512

    1e03e8703b72d6ee729895973296d1e5d333089c19efb35bc5850fe43df70bd4c82a77475d0cc0ab427ee1ef5e471148e62296392eead508f14b49df93c2a7ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\60E31627FDA0A46932B0E5948949F2A5
    Filesize

    1KB

    MD5

    1ba25895dc793e6826cbe8d61ddd8293

    SHA1

    6387cc55cbe9f71ae41b2425192b900a1eb3a54f

    SHA256

    cc4c5c999ca59e5a62bc3ffe172a61f8cf13cc18c89fe48f628ff2a75bdc508a

    SHA512

    1ff9b34fdbeae98fa8b534ba12501eb6df983cc67ce4f8ffc4c1ff12631aa8ed36ff349c39a2186e0ac8d9809437106578a746eec3854b54fef38a3cc0adb957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_244F8153991C95DE7516D65AE7D1F0F6
    Filesize

    1KB

    MD5

    698fed73c6635f04ec0093fa2c8e1f06

    SHA1

    808c6d713938660cdecba1852e640cd3ad4f75dc

    SHA256

    d4f2375bcfebfa21432f00ba82de5230410004c3290665f8cf33ed96141a59a8

    SHA512

    4623c3bc06a63e215e80a2b29032f03ac26b13ebd08ccaf37f1767412d8e1a690a954e0064d4a8f738640039f6203df62632b33a78bacab54c20aacbadff355b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_3ED18E5A6C9AC2A20DED4172F963FCFB
    Filesize

    1KB

    MD5

    8db5dd7009c601191c2484ddac871337

    SHA1

    05eb44e0c1e0f9ccb7911ec79c5bfc0c4d180771

    SHA256

    eb9d685d0317444d5255c66c4afc0612bbbd31e9ebebed9be136762adc1734ec

    SHA512

    4a1e44db6a28deda2ff71dd9562ed9a16b588934048a862c4a9ce79d0b2a95a973cc3dd2feeb6bc22dea38c4fe30d3d37ca5805a716544a762ffc1e723c303bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D47DBD2F9E3365FBBE008D71FB06716F_D33192D58AA9CA2B9097E848E9FE86DE
    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5
    Filesize

    182B

    MD5

    67e76777f2f819de819b48038e4774bb

    SHA1

    2c870736da7b4ed8c9ed614a42b6485ce8a95f66

    SHA256

    3f7c09867894e4ca8dc7e8e0c8469bdbde767505aef5b5a7377a66fac3eef8ce

    SHA512

    991bd99a731f1abedf8b0b17947295a77c959ba4c72d2807404521c8e302ad0ae2515b6d0c0490df2a6110283f28e6e5ff10e63546a0c3531ff3dda4379e727a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_244F8153991C95DE7516D65AE7D1F0F6
    Filesize

    398B

    MD5

    a45cd5a7c10ed9a86550c4bed2772d73

    SHA1

    0f155ecf23dc7f5bd6b403f03763d7c02f4ec144

    SHA256

    1477bb08717afa3b8388303dedeabec95db3c3df44fc74f77ffb78da1a3e69fc

    SHA512

    09f1ece9d0fd9e8438c1dbbf15e814d731d3f7c9997afd933f616d55a8fb64c60bd86961bbf11c41ca20898d0be1f840a442a256b22b70f7f7928e246c39319e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_3ED18E5A6C9AC2A20DED4172F963FCFB
    Filesize

    394B

    MD5

    78f5d59b03317c1125cc41d47fcffd1a

    SHA1

    4ec0ee1eb415bf85e0e3e6db7d77ff467fed66bc

    SHA256

    e717e64a2045c53a063f411e3ce99baac7b907773b129105c185f55f68a35e67

    SHA512

    7aef52b87a9904f2e2cd28f22e51479149c1282646c32d8a43152145bfcb6d65e7f2bb10e8941f05fea42ea08250c8e72107ad17404c9775a309f16991fb85d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D47DBD2F9E3365FBBE008D71FB06716F_D33192D58AA9CA2B9097E848E9FE86DE
    Filesize

    408B

    MD5

    d2fc1d9f4672639549c246402921cf59

    SHA1

    6a204f2b773a0cfb53d5c812aa15feb04fbc19a0

    SHA256

    b221adc9adf59b931f3eb90f7bdbfd36b39f6c8c95cfb06234ca45baefe885c8

    SHA512

    47080755159734b09aff8122fa0efeb1877f9229e30efd33524b9bebbfc3a905bd17f9f1651c92834fc8b9b45729806b7c87289411ca5ba7a0f43c7b65e8e897

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\7d39468c9c7a5e722cdf752071865924_JaffaCakes118.exe.log
    Filesize

    408B

    MD5

    cd29580176e5cd2cfe25c32540a031b1

    SHA1

    844900a54849d4622a80fe6e1f60fa570d016d43

    SHA256

    2ad488ddea8fa2bcdbafade2495ea5573ab36eb0d84dcf171c600514e3078a52

    SHA512

    28d1b9056572d99e99b31acbcb5b76ba9d546d8527cd666837df40018afb8a3292055428ea7516ba8b98c43d887c82c2456f4dd664d39a73b7c13b0f6d3c528e

  • memory/220-0-0x0000000074A82000-0x0000000074A83000-memory.dmp
    Filesize

    4KB

  • memory/220-25-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/220-22-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/220-2-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/220-1-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/1144-54-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/1144-47-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/1144-46-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/1144-39-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/4024-27-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/4024-26-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/4024-19-0x0000000000400000-0x000000000043E000-memory.dmp
    Filesize

    248KB

  • memory/4024-57-0x00000000072B0000-0x00000000072C7000-memory.dmp
    Filesize

    92KB

  • memory/4024-58-0x00000000072B0000-0x00000000072C7000-memory.dmp
    Filesize

    92KB

  • memory/4024-59-0x00000000072B0000-0x00000000072C7000-memory.dmp
    Filesize

    92KB

  • memory/4024-60-0x00000000072D0000-0x00000000072D1000-memory.dmp
    Filesize

    4KB

  • memory/4024-61-0x00000000072B0000-0x00000000072C7000-memory.dmp
    Filesize

    92KB

  • memory/4024-63-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB

  • memory/4024-64-0x00000000072B0000-0x00000000072C7000-memory.dmp
    Filesize

    92KB

  • memory/4024-65-0x0000000074A80000-0x0000000075031000-memory.dmp
    Filesize

    5.7MB