Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 00:21

General

  • Target

    0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe

  • Size

    155KB

  • MD5

    0b7c9f69a94b45d3ba41ec21747d5257

  • SHA1

    09f42eb50a34500f6cc3cde6a18dce0883707986

  • SHA256

    d60db77657efe6a3dd701bf72bc16dfb56306bc1b0d508a549aca0d8f36338c1

  • SHA512

    af3eadc5c49b43048ac9195f98001ded443463d337dade79e7ea90ca0623955aa1aed23b0f45e7964b7797cc63bf95aa31025930443ad2d87e8e7e2c891d6aa3

  • SSDEEP

    3072:Nnj9jtfU+INndIc0JHmHkCAZfViVUdR2ckgAWTjlohOg6sZQGfPUMAlXzsl:NjbeinU3Cf34ck/WTjCkgvfgB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe"
        3⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5bcyvync.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6552.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6551.tmp"
            5⤵
              PID:3680
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5bcyvync.dll

      Filesize

      32KB

      MD5

      9ec858d4f7d290ccd2c9cf89b19bf075

      SHA1

      bbbb32f29a397556890de580d29fb1a19407f310

      SHA256

      fe74ebe828464ec37d11cfa8d4d3b5a3f7b31a5b64a2a7c611858866b77a5067

      SHA512

      7581699b29794f0c1c60d98385ce1cf0ca863dddafe8a2c588e007310ff05ae55d1cd3d24db0fd4bdaff40a2d1c5a6243ca250e2f3fc8e130726cd5b6b77ae9f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe

      Filesize

      53KB

      MD5

      e80f959c5fa918eeb106b87ac88f3b1b

      SHA1

      b31cb37cdd9ea70af01437e3ed4398fef421a232

      SHA256

      8e2e1357b6dc472c1beaa9358cbfa21be653b3d171e9b4bf086c15dcca9c3df8

      SHA512

      061236fae2212451ed45cf6019d51145bbb2259167f0d3e5a1560e1224d0020c5e4561c3482ff6df3d6c9c9ce9f793c1d60a97b40da4702bf44414fd45e268d6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe

      Filesize

      20KB

      MD5

      e3761cbb4338919e74a783ccba9df608

      SHA1

      c834f300e52b3623fc21196baa9c066594f0eb5a

      SHA256

      8151fc1655de34870408efc61ae0794f0fc0263f82649d2de78c527da249d87f

      SHA512

      850bdb16b42dad3259c6213ceb0fa888c023209429c254deb138a563b50d2adbe3b0b7ead9a9d48cc89c93a9ee1c9a46dab9255bde4796293611d214763b1001

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe

      Filesize

      149KB

      MD5

      eaa7bc60632fe839d29d9264b76ec2e9

      SHA1

      9817f6f99631d76836ce56b253dacc1ecfb2d049

      SHA256

      63a28d42281c22c3ef912805a4d2f398752e065729fcc4e57a283378d7b832dc

      SHA512

      4eb39c2ab73cb86ac21e5c782f1ce874f245d127caf42abcb5e0a312e8794c168fe1ef24bd1af7ff3a39a88f6052c8a1f9bbd76b247d228eda4b8636e4d506ed

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fFirstNames.txt

      Filesize

      7KB

      MD5

      890ead2e9641fb4d552b70f5cba861e1

      SHA1

      a136cf74a7e7bc431084758063ef26fedd2d8346

      SHA256

      60fee88b19f44b00cbc6d3e4e41eefb53621aa838c79ce429d13d73fc02fefc6

      SHA512

      ac4fea6d72d83ffea6cf30ff1996bd2f3ee35ae7d48a780932f426e4c5acc7e931123cdc83c509faf15e298994eaac35dc17ac2f1cf7ccccc7ba142608e9aa73

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lastNames.txt

      Filesize

      7KB

      MD5

      0d35116485e8fb0a458d49989e61197b

      SHA1

      970c8a8111815f7d7631d7e3e73609eb2563e128

      SHA256

      f5cc940e3e835faa99285a66f0787546ee33175b01769251467d54db0409de15

      SHA512

      416e761e70db41a640a7ee22995c4ccea8f4a29131b58171ee4aa74d1937e312a5215796a44dc7778fe9371201c29597cebc2c8b556ba60271a57a4868d7d49b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mFirstNames.txt

      Filesize

      6KB

      MD5

      056de44ff02c983d6915228cfcd970fc

      SHA1

      b41793853c18f620a95dc19e91739fb77f975615

      SHA256

      9495302ed6e44d73bf4d59d01598e878e97c621cff83042c27b461726c645971

      SHA512

      7b18a8c2cee6979a8fef5324c0dcf254e89a3883a05dcec3eba10f589b87d1f5086e7427b2d96e4ba60bf97f313a0d8250ae1d27d9e1fe1e8b62fed74937ff9c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipCodes.txt

      Filesize

      43KB

      MD5

      fb2f21dd9cf648dc34f8e8f3f3a71b4f

      SHA1

      74ae0d969bf3eae2812cac75406e194818c6af8e

      SHA256

      67b0fe6149bdafc95ec8eb1f74d96f29d49f4a90f8f2df19ad60da69e8e3b8af

      SHA512

      a61b41967976b319096aa5220b317ff2c2d9bd20e759b793c22453925b68435bb2ee793032b5c32813ac102165ef5cbb39e142d27fb340f1c3b0e9a5d4299a67

    • C:\Users\Admin\AppData\Local\Temp\RES6552.tmp

      Filesize

      1KB

      MD5

      9bc8486a528fd737e6e69f206b8d9144

      SHA1

      466d1e3df6e8b4f1ca0723e36566343201bf603e

      SHA256

      28439cf868495aafebb1cced6ddb4ea131f1227807b94111e70eb6936a1b1858

      SHA512

      9b8eb759e6ff1472efa8282e1335f6b84a107d57740d7dd80e9cc50f17ff92e5e5c82ce8255bc6236e0d3c556fed389c4a260a1605114421bb1771872c311424

    • \??\c:\Users\Admin\AppData\Local\Temp\5bcyvync.0.cs

      Filesize

      39KB

      MD5

      23a76cc9317bc2d7757e89d7197a893e

      SHA1

      0372ee4a8404bdb8ba6cba344448b0754b98c2ce

      SHA256

      db6c8cfa63aa4d909eb60e8ed30235b56508e3bfab2cfa3e93ddd62c94179022

      SHA512

      68fac7a9ecb8acd44107d0b2ecc0077b7f5185ac5a2ccd0e3e319b4dce36b9b9a53b33b1b8ded02427b4cbee5c28ebaa969849122ca13f41a77f72478282bb41

    • \??\c:\Users\Admin\AppData\Local\Temp\5bcyvync.cmdline

      Filesize

      598B

      MD5

      e9ce0f07e696734eb75aeb332adba571

      SHA1

      3c57218bd2d3767b302d13ba96129d17bbd948c6

      SHA256

      2c07028d5294264d83eac943112e07cb4be59fbeedb0e2134e171fde97d831ed

      SHA512

      bd162d4228bc89c30727599c798beb7a5616d09edf69bb8dc2d36fb243921ce0a74eafe4b1acea3ad87c6be5c122a4a01139bca1455e3b9baa49e2c1481263c4

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC6551.tmp

      Filesize

      652B

      MD5

      93bd3640acd1a9a68042a6b68e5d2674

      SHA1

      57f087bc6ef4264599bacbf5ffd622620daf16ef

      SHA256

      e63e8f3abeae752698f61775eeabd1d87cb747b0927a5cc77f21dc031559296c

      SHA512

      f34c0432460a55896cd7a3ba9b07c7502b51978fcb0e5cb2078c84a892bff253a4619f10814a92cf93dcc6aaadea61ce4a0fa40e166e4102fac75785c1bb07b9

    • memory/1708-66-0x00007FF9F7F25000-0x00007FF9F7F26000-memory.dmp

      Filesize

      4KB

    • memory/1708-35-0x000000001BD20000-0x000000001BDBC000-memory.dmp

      Filesize

      624KB

    • memory/1708-36-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/1708-44-0x000000001FEE0000-0x000000001FFB0000-memory.dmp

      Filesize

      832KB

    • memory/1708-65-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/1708-32-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/1708-59-0x000000001CB10000-0x000000001CB1C000-memory.dmp

      Filesize

      48KB

    • memory/1708-38-0x000000001BC70000-0x000000001BC78000-memory.dmp

      Filesize

      32KB

    • memory/1708-68-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/1708-31-0x00007FF9F7F25000-0x00007FF9F7F26000-memory.dmp

      Filesize

      4KB

    • memory/4388-34-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/4388-62-0x0000000021370000-0x0000000021B16000-memory.dmp

      Filesize

      7.6MB

    • memory/4388-63-0x0000000021B20000-0x0000000021FD7000-memory.dmp

      Filesize

      4.7MB

    • memory/4388-33-0x000000001B600000-0x000000001BACE000-memory.dmp

      Filesize

      4.8MB

    • memory/4388-39-0x000000001CFC0000-0x000000001D022000-memory.dmp

      Filesize

      392KB

    • memory/4388-67-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/4388-37-0x00007FF9F7C70000-0x00007FF9F8611000-memory.dmp

      Filesize

      9.6MB

    • memory/4976-27-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB