Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 07:43

General

  • Target

    9783960bd13fc9f6e266f220c5a174aa_JaffaCakes118.exe

  • Size

    3.5MB

  • MD5

    9783960bd13fc9f6e266f220c5a174aa

  • SHA1

    6a483c098d04152ed62b4e53600e819eaad163b4

  • SHA256

    98b7ae6e91fe56a7597d1559967fad5ecc42e46c5021587dfa4be6c444412514

  • SHA512

    2f808cbca7eeeaaac626d7519caad4ea407345b542c8a249179567d4da0c54cd8a05f6dd6dc9179a51ad23f4ce456490f212eea6c37dff6376ba8bd5884ae606

  • SSDEEP

    98304:X3bobVkwiXFlJboUaQXK1XR0ZNSHm8GeRLfWFZzl:Hbeirfa1GZN+PhLIZZ

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9783960bd13fc9f6e266f220c5a174aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9783960bd13fc9f6e266f220c5a174aa_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe
      C:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Users\Admin\AppData\Local\Temp\is-R8CNN.tmp\drvprosetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-R8CNN.tmp\drvprosetup.tmp" /SL5="$501DE,2744501,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Program Files (x86)\Driver Pro\DPTray.exe
          "C:\Program Files (x86)\Driver Pro\DPTray.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:5084
        • C:\Program Files (x86)\Driver Pro\DPStartScan.exe
          "C:\Program Files (x86)\Driver Pro\DPStartScan.exe" /SILENT
          4⤵
          • Executes dropped EXE
          PID:1440
        • C:\Program Files (x86)\Driver Pro\DriverPro.exe
          "C:\Program Files (x86)\Driver Pro\DriverPro.exe" /INSTALL
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:756
        • C:\Program Files (x86)\Driver Pro\DriverPro.exe
          "C:\Program Files (x86)\Driver Pro\DriverPro.exe" /START
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks system information in the registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3576
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Driver Pro Schedule" /TR "\"C:\Program Files (x86)\Driver Pro\DPTray.exe\"" /SC ONLOGON /RL HIGHEST /F
            5⤵
            • Creates scheduled task(s)
            PID:4752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Driver Pro\DPStartScan.exe

          Filesize

          819KB

          MD5

          fe31b439855c9bc8af54bc83b61e3d4e

          SHA1

          3a4cb85b20b3bd3bb904de725eb974c4ea16a97b

          SHA256

          0bccf5266397c50c63d5dd23ff6c0c2afb672325a6300f2e9e44e71d4b5485e5

          SHA512

          5be58ac4144cd19cef6163dc056d7e540c728ba71b053082d63a53114e13ab1991e419bd2bdb0fff00f5a721ddee40f70579d7b43acbd2772be3b1d30523a97e

        • C:\Program Files (x86)\Driver Pro\DPTray.exe

          Filesize

          810KB

          MD5

          01f6a32f6b28d37b3155325a83d96410

          SHA1

          b5cbaaae0ae15ebb2985733fdce3e156555abc82

          SHA256

          8cb02e1a1867e40aed8a11bae3c8ea100996eb518fa0d81f3d12e02e646159d4

          SHA512

          42fe1c80bd408e7f9e36544dfc13a463e6fd07caef72b9706bba51899bd220b66826b4bf58a1e278bc6f805c43bf30bc60cebd8eb1aeefc328cdccbbee8d8021

        • C:\Program Files (x86)\Driver Pro\DriverPro.exe

          Filesize

          3.3MB

          MD5

          ec1edf352b54ab579353bf043c2014ee

          SHA1

          fc5fff6f090f7615d41df61d0d5757fb26b3a4b5

          SHA256

          0fd7ac20b7655886c6bc98efa05a7dfe5c65deb61d4d656021e4f58564a9ae08

          SHA512

          8fdba482728322b25585930a6dc8c707f44a66751ed66c056ef5380a4c769ef1654ae138deb7aa599f9c0641f618a13dc56022ed941acfdd2cc734fb39be8501

        • C:\Program Files (x86)\Driver Pro\English.ini

          Filesize

          12KB

          MD5

          8f88e83e8022bfacd1e11529fcbac372

          SHA1

          2827f7593329022d8a6672133b67d542363e5be9

          SHA256

          d4fa4405d07c959d8578d344d1fcb3bd834003682ea96ee49b048f7d1eba8679

          SHA512

          dc3d181f416633a90297a43a710c77193c4b5c387037ad4084d10372a90151cba176330d4b463f07bc1c18f09c0a84be493e16e38b84946deaf081a6567af371

        • C:\Program Files (x86)\Driver Pro\sqlite3.dll

          Filesize

          508KB

          MD5

          0f66e8e2340569fb17e774dac2010e31

          SHA1

          406bb6854e7384ff77c0b847bf2f24f3315874a3

          SHA256

          de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f

          SHA512

          39275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05

        • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

          Filesize

          3.1MB

          MD5

          3107c28da15cc8db52ecaeb41e92fa27

          SHA1

          9498f3281c0b79a8f051ca9aeb0d6132dcf0ca0f

          SHA256

          e9318226bff1cf3225c26f0bde46ad08f2a745fe9de55153a41c7bf7eb194325

          SHA512

          8b2d0c2744584899ac8cc15786dd13b977958c4d3c8f2cb50b7afeb52b0a6f647bf8b20ab19d5d3b562d8804f92b8fb5828f971124b4e089c0858f0a6ad1a2b8

        • C:\Users\Admin\AppData\Local\Temp\is-CIVE6.tmp\DrvProHelper.dll

          Filesize

          1.3MB

          MD5

          dfd23a69f1a7f5385eafafde8f5582f4

          SHA1

          e578e02964582382d4cf90ac003bffa9dcd1dd30

          SHA256

          701db9616b8ca5f24694a3b9fde8b96b08fbbe14871d9f7eeb721ff29d3259d2

          SHA512

          740dda51de539a6c889fecfeeb157ae3ae706e9b6c59931c715ec4a660420b6667b2e01954b511ae872164bdb90be887cf3beddfb2fafad3ee945c92ecf6b174

        • C:\Users\Admin\AppData\Local\Temp\is-CIVE6.tmp\cfg.exe

          Filesize

          64KB

          MD5

          0d6f95239fc7575f6356b7f9de24e4fc

          SHA1

          27433dfc46ab0538b176ca2e4504ac84d77c8bb8

          SHA256

          3b5abe6dd5dcfb988c358fe5082d12c614a9f4e692f67d3455345c1e1d971321

          SHA512

          746b6a6ac091017c8c06835ee41ddb4a8878d6aa716de7a9de36bbcc40ec6e02d2f78050c68d1f8f29fc2e532e695a193e6ce3f0285f384d5a429c7eb030b667

        • C:\Users\Admin\AppData\Local\Temp\is-R8CNN.tmp\drvprosetup.tmp

          Filesize

          1.1MB

          MD5

          91c38c395631d57254356e90b9a6e554

          SHA1

          cbe8ae15ec5c8a392b00ddbc71cf92eddd5645b4

          SHA256

          e9804fa0e9a0b249a69539bf9ba3f2df95648f56676a61b8988e6648308ae83d

          SHA512

          9f95567ceb618167899d954387771312b4895d03dcf65e5402c284af50e1ac1ec5d452a8069528a4761894dba02be7a97849be01626d1d688dc4059abf65f119

        • C:\Users\Admin\AppData\Roaming\Driver Pro\program.log

          Filesize

          164B

          MD5

          8a8643166dbaa129dbaecb287e987b8e

          SHA1

          e7cd7de83035b8828b4e8f10330a03a128d0c5f7

          SHA256

          b374f6ae7ec7ab51f56d6a4680fb222d8436be5392526d284452518b9c0be457

          SHA512

          dac7b64e8a3c72382e2f7db99f181a30ef68760ec8a4b1f1ba917c91957c8bb7058f4e1c513521e82c3a954841751d61db68cb76857f559c96b4e1aaa9148229

        • memory/216-18-0x0000000003240000-0x000000000338E000-memory.dmp

          Filesize

          1.3MB

        • memory/216-21-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/216-9-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/216-108-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/756-105-0x0000000000400000-0x0000000000755000-memory.dmp

          Filesize

          3.3MB

        • memory/756-106-0x0000000060900000-0x0000000060970000-memory.dmp

          Filesize

          448KB

        • memory/1440-86-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/3576-117-0x0000000000400000-0x0000000000755000-memory.dmp

          Filesize

          3.3MB

        • memory/3576-135-0x0000000000400000-0x0000000000755000-memory.dmp

          Filesize

          3.3MB

        • memory/3576-128-0x0000000000400000-0x0000000000755000-memory.dmp

          Filesize

          3.3MB

        • memory/3576-123-0x0000000000400000-0x0000000000755000-memory.dmp

          Filesize

          3.3MB

        • memory/4488-109-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4488-5-0x0000000000401000-0x0000000000412000-memory.dmp

          Filesize

          68KB

        • memory/4488-3-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/5084-116-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/5084-73-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/5084-137-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB