Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 01:45

General

  • Target

    01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    01c9a70fb7e17f9d215f2346ac4055b5

  • SHA1

    e975065193cdcb04cabd256dfbe631a033d772ac

  • SHA256

    84924cc8e6a943ea4a7769379ad67178b4878809fc28a5552682ac6eea0e6c7d

  • SHA512

    b4bc41789fcab4f88bfae56df8a4f49942c9ad867d53449e147f26fee4cdbd2f38b0d2b9d13280532a411c19d1d091763bfad809a0a925e5bee6db5d7919e498

  • SSDEEP

    3072:U9m0jofzTJK5fICGdNEi1w7Z/WpEy5kym65jVA13usrF2y31uXzFaC:cmTTJsyNEhA5cMARusrAsuXzoC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C REG ADD HKLM\software\microsoft\windows\currentversion\run /v 1337 /d %windir%\system\svhost.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\software\microsoft\windows\currentversion\run /v 1337 /d C:\Windows\system\svhost.exe
        3⤵
        • Adds Run key to start application
        PID:1740
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C xcopy "%windir%\system\*.sd7" "%windir%\system\*.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Windows\SysWOW64\xcopy.exe
        xcopy "C:\Windows\system\*.sd7" "C:\Windows\system\*.exe"
        3⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        PID:3980
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C copy "%userprofile%\gadu-gadu\ja\config.dat" "%windir%\system32\1337logs\config.dat"
      2⤵
        PID:572
      • C:\Windows\system\svhost.exe
        "C:\Windows\system\svhost.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:1420
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3644 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5008

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\1337.ini

        Filesize

        118B

        MD5

        30efdbf73989806b5c748b1c22c53cb1

        SHA1

        5821cc1e89a9fda438c41b87712b188405367e06

        SHA256

        25d109f34670c4a50311a913ed5ff005df87d8bb02ae8fe2b32fb6ff31339f29

        SHA512

        97bcc62ca4dccb5a35791601d0d4245d8d4b7ce63068481248025422e2fed49ddfe4665bca15ff1c1a753a60921c8da4e701045055a2cc57a2da53ff25810b41

      • C:\Windows\system\svhost.sd7

        Filesize

        32KB

        MD5

        7c3d8955631512e938b8a2e0a3b82ade

        SHA1

        d3b5c3d06088654e40796f461f7fead9eccf6147

        SHA256

        4fdede0161ac67f8d0c9f01963e0eae52c6669ba06262ee30aca9d49c1a88103

        SHA512

        a60d05ac1ea306158780eb291c657aa957b89db6dcfa24753e2160ecd71a36f2a17349a2185c3dab5d200d7fc9a5523d9466bc87d59ec032f315b1990c71d597

      • C:\Windows\system\wuaclt.sd7

        Filesize

        24KB

        MD5

        d283a06cd1bc40dbafc221cdfc323907

        SHA1

        4bd647cb10781699628ce2045367bce80db1243e

        SHA256

        63c25587320cf0a6772f862d974a969b587a6e4f517a527c6ab5336042233445

        SHA512

        d91dd62d7ae378a7fbf15aceff2917c91fdb54a9cc770aebfa6f327cabd507c18b6f6715b07620b96d571172df26d2947307938c3bd4fc5a83353bc499cbbdb9