Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 09:53

General

  • Target

    04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    04ec53a1c638d330d93daf8b7bfaadad

  • SHA1

    c4c17dd3d907e2482abce5577b32b53ced7112b2

  • SHA256

    1579be2c9e38abc5bcbeffc11285886aab4c535e83ed002b1866ba4ed79f95fd

  • SHA512

    bfb95ed883e813abf582983043845667699b7f131cd6cdc52bd616c009827f490f8157a0610586259af4f91d4763cf5fb9d479e5bcb0e4cc5b057dd04bf2a524

  • SSDEEP

    1536:WUsuXxpfTtbrO/A5HN+TOC+eWmcJ9J+r3:6ITtx+R+PJ8

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 13 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\lua\1.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\PROGRA~1\INTERN~1\iexplore.exe
          C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?82133
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:512
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:512 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4480
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\lua\1.inf
          4⤵
            PID:3968
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\lua\2.bat
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4872
            • C:\Windows\SysWOW64\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .bat /f
              5⤵
              • Modifies registry key
              PID:4900
            • C:\Windows\SysWOW64\gpupdate.exe
              gpupdate /force
              5⤵
                PID:3120
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCR\CLSID\{D71C5380-D2A0-CD69-E3EE-E1002B3A309E}" /v "IsShortCut" /d "" /f
                5⤵
                • Modifies registry class
                PID:3948
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCR\CLSID\{D71C5380-D2A0-CD69-E3EE-E1002B3A309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\lua\3.bat""" /f
                5⤵
                • Modifies registry class
                PID:1700
              • C:\Windows\SysWOW64\attrib.exe
                attrib +s +h C:\Users\Admin\AppData\Roaming\lua\tmp\a.{D71C5380-D2A0-CD69-E3EE-E1002B3A309E}
                5⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:3428
              • C:\Windows\SysWOW64\attrib.exe
                attrib +s +h C:\Users\Admin\AppData\Roaming\lua\tmp
                5⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:5096
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\lua\2.inf
                5⤵
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:2612
                • C:\Windows\SysWOW64\runonce.exe
                  "C:\Windows\system32\runonce.exe" -r
                  6⤵
                  • Checks processor information in registry
                  • Suspicious use of WriteProcessMemory
                  PID:2488
                  • C:\Windows\SysWOW64\grpconv.exe
                    "C:\Windows\System32\grpconv.exe" -o
                    7⤵
                      PID:1716
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1036
                • C:\Windows\SysWOW64\find.exe
                  find /i "360tray.exe" tasklist.txt
                  5⤵
                    PID:4608
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /d "1" /f
                    5⤵
                      PID:1604
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /d "1" /f
                      5⤵
                        PID:1552
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKCR\htafile" /v "NeverShowExt" /d "" /f
                        5⤵
                        • Modifies registry class
                        PID:2136
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKCR\htafile\DefaultIcon" /v "" /d "C:\Program Files\Internet Explorer\IEXPLORE.EXE" /f
                        5⤵
                        • Modifies registry class
                        PID:1808
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.82133.com/?S" /f
                        5⤵
                        • Modifies Internet Explorer settings
                        • Modifies Internet Explorer start page
                        PID:2304
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.82133.com/?S" /f
                        5⤵
                        • Modifies Internet Explorer settings
                        • Modifies Internet Explorer start page
                        PID:3520
                • C:\Users\Admin\AppData\Local\Temp\inl8D78.tmp
                  C:\Users\Admin\AppData\Local\Temp\inl8D78.tmp
                  2⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2996
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl8D78.tmp > nul
                    3⤵
                      PID:4668
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\04EC53~1.EXE > nul
                    2⤵
                      PID:852

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\cdf1912.tmp

                          Filesize

                          915B

                          MD5

                          be85f25f9b7db8406cd5355970ab35a4

                          SHA1

                          9b3dda905d2e30940e7205846195b2d7b6636747

                          SHA256

                          fa23240bc8f6b3bfe2622188299e24aa286ab3d27ba0e40358f8893926a6dc59

                          SHA512

                          8418f4d3dca7002394e8d538d90bfe05582a2ee4b10f8526c3cbb87c8a512ee606afd0172eaf57e47bde21c0129b53a740c4e5a5ed1efa205316edc5e9ab9ea2

                        • C:\Users\Admin\AppData\Local\Temp\tasklist.txt

                          Filesize

                          7KB

                          MD5

                          131530cdc25ff3547489837c7b23abf2

                          SHA1

                          b7db1854d8b0c18d29fefefe66139beedee1fa55

                          SHA256

                          52cd261d8e4260483873412e883cb627c20968ec84f3f1eea151d3294f5b1ba5

                          SHA512

                          0f3e129183337ecbd226c622caa5b3256aaa4c76dfa9d60de32ed8dff0b2a512df1940e7dbbf1e6e706984a8b59d89d5dcca71846da095ab9670cb5e50addabc

                        • C:\Users\Admin\AppData\Local\Temp\tmp_ext.bat

                          Filesize

                          50B

                          MD5

                          e08ad52d3d132292f9c51e7cfec5fe08

                          SHA1

                          269f7eb185a9ff02664297bfb6f5df9f86ec10f0

                          SHA256

                          bd2a3003fb1f771283b30a044c49aecb72bfdff4322330337dba4992ecd198f4

                          SHA512

                          3dc0331f3ee9a57de7bda71a94953239bc7033a130f2b783b35d17ce3ed7b7928c154323d10ba81bd81d3bfd2d7c123cec55f5178d2b44286c2f857ccd6a1722

                        • C:\Users\Admin\AppData\Roaming\lua\1.bat

                          Filesize

                          2KB

                          MD5

                          d720afa7c1bc6d67157c1fc5e1804f5f

                          SHA1

                          372cb41239edb1f4452a67b2c116cd4016b0f608

                          SHA256

                          fa0eaebd30bad6d62a875ff2bbd6861750cdf63ef811e620d95584337d8805e3

                          SHA512

                          1f4b6dffc79fbdac3868dbd9c9654374eaf28600053dcf041dcc0bbfdfb7d6610d29b8edabf0a88d3d298e8877f927c6f0600fca41ccb1e7d4aaed44ea1d3f1e

                        • C:\Users\Admin\AppData\Roaming\lua\1.inf

                          Filesize

                          348B

                          MD5

                          5a2ee8346e676499a5658277e98b2317

                          SHA1

                          34a8d363b3dac690a251e181b3522b3d9e7ffe6e

                          SHA256

                          4e367269b4b19b937a7f7a420613d2a69e96aef456dfd4b4f6853c1e92885cca

                          SHA512

                          86f575fc7816ed33ef996e6385bae144c4d750be44f59dd1856b7f601b5291960f522153206a38de75f942537b280c2b49a1c038ba82faa36b9e903354ea9242

                        • C:\Users\Admin\AppData\Roaming\lua\1.inf

                          Filesize

                          410B

                          MD5

                          66a1f0147fed7ddd19e9bb7ff93705c5

                          SHA1

                          9d803c81ea2195617379b880b227892ba30b0bf6

                          SHA256

                          4f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764

                          SHA512

                          cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597

                        • C:\Users\Admin\AppData\Roaming\lua\2.bat

                          Filesize

                          8KB

                          MD5

                          7b2cc87165c7598cd390c0f7cf4d6717

                          SHA1

                          04fd7ce74a29e2df543b9f3eca0bf8f82064f5af

                          SHA256

                          4f9d55cf344b944fd73ed63560ee9bf9130f124d593502b5a67abab2586bcd62

                          SHA512

                          0d8ca7b61c3a1d69b571063c2d43b623f2fac296e8f9c0dda1103212546632356aeaac6b21de1097ed54682aeccd5a68d8ef08f03f6ad0fc2bd386c7f52bc996

                        • C:\Users\Admin\AppData\Roaming\lua\2.inf

                          Filesize

                          244B

                          MD5

                          2de3e6e4faea8c4a10ddd4f26455caca

                          SHA1

                          b7c02274aa020619e6c7b925427b027ffcc28629

                          SHA256

                          9f29d64886130752a5fe40ce6e83a8f35dc65340871cfe435499a609037c2824

                          SHA512

                          0e49cbd89766d3697ce4c9a2c83de32ebaee2d41f1a635a94cf0c73541aaa614f4f5b755f55d21fdea07fc76985bc741f2649abc1c6a32e9876ffa6b3a1c33c8

                        • memory/512-75-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-69-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-48-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-46-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-55-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-58-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-62-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-64-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-70-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-54-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-72-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-71-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-74-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-80-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-81-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-79-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-82-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-83-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-40-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-73-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-89-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-47-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-68-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-66-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-60-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-57-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-56-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-52-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-50-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-49-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-44-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-43-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-41-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-45-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-91-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-96-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-94-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-93-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-92-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-90-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-121-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/512-127-0x00007FFF9F670000-0x00007FFF9F6DE000-memory.dmp

                          Filesize

                          440KB

                        • memory/2584-0-0x0000000000400000-0x0000000000418000-memory.dmp

                          Filesize

                          96KB

                        • memory/2584-140-0x0000000000400000-0x0000000000418000-memory.dmp

                          Filesize

                          96KB