Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 14:23

General

  • Target

    06ca6d90c80d76ef20aab6bc99167779_JaffaCakes118.exe

  • Size

    685KB

  • MD5

    06ca6d90c80d76ef20aab6bc99167779

  • SHA1

    a55aa39be0ade1b0d8fd3f9954e7cb5ef7545cf0

  • SHA256

    5f6dfef989b9ac4da5ccb5fcb8bc07ee3d6b86188e6d20d5d349d42191e15ab0

  • SHA512

    00b6d256687ca02ef0d97317cd3f4712c87a9e777ffcaea9d06ece629513988dbed7a6a69d0500885300790a5824abe3e80c9f858a4b2271810fd1cfe79e2051

  • SSDEEP

    12288:qW5n9Ol1DiaEtPBw4UsKK7A+y5gmyF2xP2W21WYdpPz8ZtZVyLmg/TsNQ1oP:qonU+ax4e2myF2x+W21rdpP4ZtZELT8f

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ca6d90c80d76ef20aab6bc99167779_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06ca6d90c80d76ef20aab6bc99167779_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\windows\SVCHOST.EXE
      "C:\windows\SVCHOST.EXE"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2652
    • C:\windows\Pinnacle.exe
      "C:\windows\Pinnacle.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Pinnacle.exe

    Filesize

    261KB

    MD5

    b2755b1b19afb6f091b95a04fcfc7e32

    SHA1

    13bb01e2c504b1d76ad20931c33bf1361b8a07e8

    SHA256

    8ec3c7cc0cade861b181c9ebe19b970ee5bdad92cc50d1fc5de8bcc1b3b831ac

    SHA512

    0ee56aa01f3861179aed1790b2ac619c3b0e03ceda4e188fdced6b49c5f9e7d3bbc510f54e8e7b69dcaee2f92594d9e536982e4e5bd4eda5763941651661669e

  • C:\Windows\SVCHOST.EXE

    Filesize

    500KB

    MD5

    2c3a3dfc019e42a6dc14ff2c2de71cd6

    SHA1

    c5013a9e0253928d75176a238bd21ff311364e9e

    SHA256

    d4e7e8e9f0d90d90029c83cdfbe5810bb1b20605d50cd57ef008f63dbe44c858

    SHA512

    f830f3c4fe0c8bf507f541b7c82eba93370c81fcbbaf89e54492873086838e20ac3a4d55957263138f4e76e7cb059ea55ca49dd0e672a4d237b0aa37e1e7abf8

  • \??\c:\windows\svchost.inf

    Filesize

    3B

    MD5

    a5ea0ad9260b1550a14cc58d2c39b03d

    SHA1

    f0aedf295071ed34ab8c6a7692223d22b6a19841

    SHA256

    f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04

    SHA512

    7c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74

  • memory/1112-4-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-10-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-30-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/1112-29-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/1112-28-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/1112-27-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/1112-26-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/1112-25-0x0000000002360000-0x0000000002362000-memory.dmp

    Filesize

    8KB

  • memory/1112-17-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-16-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-15-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-14-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-13-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-12-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-11-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-21-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-3-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-8-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-7-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-6-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-5-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-0-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/1112-1-0x0000000002020000-0x0000000002055000-memory.dmp

    Filesize

    212KB

  • memory/1112-18-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-9-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-19-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-20-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/1112-48-0x0000000002020000-0x0000000002055000-memory.dmp

    Filesize

    212KB

  • memory/1112-49-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/1112-2-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/2652-80-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-68-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-55-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-82-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-59-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/2652-62-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-66-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-51-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/2652-78-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-70-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-72-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-74-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2652-76-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2856-69-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2856-50-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2856-56-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB