Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 00:33

General

  • Target

    01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe

  • Size

    206KB

  • MD5

    01732b6e6b7ebe6efed4369ea4aa8fb0

  • SHA1

    262e971df34b999f17843a537532fcc275beb163

  • SHA256

    4584282c886f57b2577b19a83d842f7d48595ad91487669e3906ae2601f7f4f2

  • SHA512

    837c9e2ab0041b6f3b616b4984f5a6229e67b0d127e72dee5b762ee21282d72ff3260fb94532bbd894fed6341febde1ea2d18b373ae3526f82476b91d945b170

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unX:zvEN2U+T6i5LirrllHy4HUcMQY6u

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4576
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1188
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2524
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2080
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3092
          • C:\Windows\SysWOW64\at.exe
            at 00:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:624
            • C:\Windows\SysWOW64\at.exe
              at 00:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1456
              • C:\Windows\SysWOW64\at.exe
                at 00:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3148

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\mrsys.exe

                Filesize

                206KB

                MD5

                e30d75c370a7c8daa8240c962c7e96e3

                SHA1

                d6fe9b712f8922c702e12daec7299bfd4b8a488d

                SHA256

                c328fec1cc75540cffbb8c3067282e39caf63f2150c3f984c84ea074f0a43496

                SHA512

                7962e5c5a0c17e74ddb2626a91c3b841ee006a1c4c29aa068c38b847f3bb51f58554211d54b51af7052f98cabdcd1280836d8d4297f21818c8086e577fdf627b

              • C:\Windows\System\explorer.exe

                Filesize

                206KB

                MD5

                4cc06998cf9189110fc86cfaf8b62d09

                SHA1

                d4f0904b0dbc6afdc382c80be0ae577e9995ef4d

                SHA256

                ece41bb5199b65ef741e284922690593e8ad4bba8bc598af5274cd3163e817f7

                SHA512

                751011b4adc89ee25de99f0172d15edafcbd001d98cbc5f6d81b8ce9cfc1f6b73ad8a034a28acfe0ee505ea57b52f996517fc2905aee9f20e260231a050edfd0

              • C:\Windows\System\spoolsv.exe

                Filesize

                206KB

                MD5

                172b16f420e721494cba3711010be168

                SHA1

                8cd2fb9740d70c812a1f4e3d65b08f97c4e3dcf2

                SHA256

                15be4e101b4b433766285a059f4506f28240d787367498df363fe82751817a7a

                SHA512

                26cdb370acf404d15f14729bd3a4ecf1f3c2439b36b37a4837e4426a690668db03cb0238dd142701ee9f7c7c82da9f4266f8c60655cf066335d994b533fb822c

              • C:\Windows\System\svchost.exe

                Filesize

                206KB

                MD5

                0d87e1e043c44a3c74e2cdd3fc17eefa

                SHA1

                b5afdb477304cdcc08ce7664425ab11084e28230

                SHA256

                8144a040a44f22c52d79791367ed0729578cbece3cf0113b9a8774abd7b8b0d2

                SHA512

                277740140b52d07074774a1f1b12acedb81c1f6b317b3c155a6ab064f2f756d1462e0321fa98e7148904ef8ed385d2275cc1cb2494e675878eadf726f47391ee