Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 15:02

General

  • Target

    8ad4bf941fd3db9659915ac3ad4bd442_JaffaCakes118.exe

  • Size

    185KB

  • MD5

    8ad4bf941fd3db9659915ac3ad4bd442

  • SHA1

    71b6f2f4eba92face6f5fa01178252e222c783f8

  • SHA256

    d9d855847fb7bb8486266010286d403a20b7d267e613e37bbfa58bda2f4426be

  • SHA512

    eb91e7dafb39385f0dbef564b88ae69b522f3a612770ee721f8635e6ced209de8efef9df6f7b803829a3ab5e42b7137e6569056662bc4efa75243fbe78bbb2b6

  • SSDEEP

    3072:cX7DItrfaocyTgfsqQOlJiqHC4h7+2iSAXs0bqHV385GUO2yem692EfjkHK8qLOk:csaocyLCizkitXjm1385GUO2yemq2Erb

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ad4bf941fd3db9659915ac3ad4bd442_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ad4bf941fd3db9659915ac3ad4bd442_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\inst.exe
      C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\inst.exe 50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe /dT131500740S /e5363260 /t /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe" /dT131500740S /e5363260 /t /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    1KB

    MD5

    2af2f004964305bf23851712c21ce9c0

    SHA1

    ad992b90510eaeb833a8a6de538dfe667a92f2e0

    SHA256

    b00391642165d4b3c50f5723bb5e9bfb00076a96fe344c542286f7a2e8e0f59a

    SHA512

    a15ba4f4ef935e6c5a58d5fa5521514de65d9d1dc1c24bc25e16130309c66791ec087c7b26cab19af9e57381a818890c494e4af935220db40ebecb689c9b3e7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    5a1ab1871c1dd0bbe715482943c74be6

    SHA1

    da4ce17e39abb581883120980f00a91cb029127c

    SHA256

    5fab31aa7540eaebb07d0315e540564b06d612b4b4eb3f2a645fd86a59e6b37c

    SHA512

    88d80e7ffc33aadb7e28363aad82f51e78bc09ef3ef193a7acb867c825bf633b04bb623796e699262c2f1b40f339bc5277b5520f17d87b2d1f6724288330545d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    5B

    MD5

    4842e206e4cfff2954901467ad54169e

    SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

    SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

    SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    412B

    MD5

    b1aecdfc26978df6f5be31e66ecc2347

    SHA1

    d8927d89db75977853b3b03c84e1745c856112f3

    SHA256

    ede19adf9f749a6f8b5015c32bc8b878f24e2699798a7e25c2f2ee1d4d25f94e

    SHA512

    9fdb4f0d9573bbda11c4838fe45a758e627b7e6354caa1d2bea7d885744413b437c34080de4304f28219dafdab381d891396a7bac507343350cf3043a62c0f47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    2fe6ec15c2b12d9ef1f6f89fab90b7f9

    SHA1

    b541d4060153e91c0a4864e3b0016735906ceed0

    SHA256

    ab7717eba62272ed3176358e878d1afd12728ecddf5396581b8610bc5b94158a

    SHA512

    8ca9b70320f1d855845ecd9d3c4109132c76eda6ce1415dd988c772ed064b59f6d542358bf693cdb5e606fbe18602d1dcf0439d7850043efe5db161b673815b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    9d1f0e0d69e3c0bea21eb18b0fac27a1

    SHA1

    ec48ddc87ac5c6a6e101143f9db64964423b71ad

    SHA256

    9b9f2c3c948e6341fe477a69e0f51c4725cf3dcd7358707215904ab7587bc7e1

    SHA512

    5e54ee36a822808a1a2cc34ea308c128b5892f37bcccfedb1416edfc72d71b72340de299a06c8872300ea591073c2e75a6eea93175f6b8a04afacb084dcaf559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    482B

    MD5

    b5cfdbd72b18d474cdd13fe689b8e795

    SHA1

    6fb2ce6687023294eacdce9e17b473a5c5cfe4b7

    SHA256

    6ec9fc6f4d272eac14230aab2c421ef3aeb1905750631691dda23efbfe984c36

    SHA512

    cec77a709ff5ae907c219eaf4081ef15c6e854e6cbce07492441df8ee76f088e18c178b61986b0d036c142046140d4d780711fb4bd14d61b09642746a5c52fda

  • C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe

    Filesize

    165KB

    MD5

    5906fff7fee2292644f3769e7acb5752

    SHA1

    af80075ab73575aa0301736a08430ddd30a45e99

    SHA256

    68a6bb6d526ee914542940174b38cf8fa166d35f8e4bb4d49bd16065cb1f46d7

    SHA512

    d4e6c9be580a292700da3178dfa4979e9e93853b477e9ccecb0ec093cc3ed86174e9f11ae940c4c65d7f2b6e1444aefc8efd0cbf6384a179c96d0a07c7419583

  • C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\inst.exe

    Filesize

    144KB

    MD5

    78c9beb846f7a1355f12474d880b2cfd

    SHA1

    dbb8ccf9114e97c1deb4da021863997d228ed04b

    SHA256

    b7ad932609760e6e4d8254d83b25d00a9114b112f77276c096ad8d62de6aff4e

    SHA512

    8b6722f6355b2cacccab6302ca141be7d082e3a1fef37672a06a8f5d25d7bc04fb6e64f79554a80cae9477d8d6c6d2045e7a6833bf142c4692c194fe0cb65987

  • C:\Users\Admin\AppData\Local\Temp\nsy4306.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/3012-55-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/3704-43-0x0000000073E40000-0x00000000743F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3704-42-0x0000000073E42000-0x0000000073E43000-memory.dmp

    Filesize

    4KB

  • memory/3704-57-0x0000000073E40000-0x00000000743F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4544-41-0x00007FFB96020000-0x00007FFB969C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4544-29-0x00007FFB96020000-0x00007FFB969C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4544-25-0x000000001BE60000-0x000000001BE80000-memory.dmp

    Filesize

    128KB

  • memory/4544-10-0x00007FFB96020000-0x00007FFB969C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4544-9-0x00007FFB962D5000-0x00007FFB962D6000-memory.dmp

    Filesize

    4KB