Analysis

  • max time kernel
    142s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 21:41

General

  • Target

    0fa1a99d6273b1621e3e339b460da1e7_JaffaCakes118.exe

  • Size

    9.7MB

  • MD5

    0fa1a99d6273b1621e3e339b460da1e7

  • SHA1

    7705b9c46d8256c152b2c0e704cd015d52a3eef0

  • SHA256

    5f7077518b585cf2a1f29dfcd86000e4d7b94d4c382f1cb22e9f28345e2f3014

  • SHA512

    02deb2508943731796c8f5f850d26d11efb96b17f0962b59bf43dd96cf6869936ccc7b92ae52ac3fc6db728283c69585085b066c82b653bf36fe450a75f7d764

  • SSDEEP

    196608:/xZjmTOFT4HG1cWvb7ASOSgRjV6UufHHBq2G0hh6QfKV:/bjmTOFTXb7H+5Fu5u0jz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fa1a99d6273b1621e3e339b460da1e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0fa1a99d6273b1621e3e339b460da1e7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /I "C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS7739C50674AE48CF991BAB5E35A927FC_5_0_4_2.MSI" WISE_SETUP_EXE_PATH="C:\Users\Admin\AppData\Local\Temp\0fa1a99d6273b1621e3e339b460da1e7_JaffaCakes118.exe"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2172
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 0C402693F482D1AD09D3EE38C0AA13F7 C
      2⤵
      • Loads dropped DLL
      PID:4080
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3588 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3284

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS7739C50674AE48CF991BAB5E35A927FC_5_0_4_2.MSI

            Filesize

            9.5MB

            MD5

            d832cefca45fb9ac738222ad3160b63c

            SHA1

            e9e5e0ccaeceb12448aba415f765c9b62d15c948

            SHA256

            c8c73e7ec75e944a7225ed27d5475a8cf0dea65608a06d7e44eebd1375262f5e

            SHA512

            00084c21db71466eb11aa87fd87e1e08c2fc00e8a615159711993203fcdad99774a86b59113bef34959a634d06776a7845885f1746d4186c260b607191718993

          • C:\Users\Admin\AppData\Local\Temp\MSI580E.tmp

            Filesize

            19KB

            MD5

            a8098832976813ce64b23879f0e5af7e

            SHA1

            46723c8b825f8828af3e5fb4a92552ee170397cf

            SHA256

            644700716cb63db1c48ff6ffffdb90d654ca8578c0a30a271c63880145813c73

            SHA512

            9f21344c09be843d4ee6d9393487107f68a8bb11426490f4cdb1a31c4d924c9a111d5f1e269c0bcedb28833fcafbdb0b9c0b2a491d55cd1250690cac944afbaf