Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 11:09

General

  • Target

    0dd79e364364aa64381242942fecbda3_JaffaCakes118.exe

  • Size

    398KB

  • MD5

    0dd79e364364aa64381242942fecbda3

  • SHA1

    32ea31863c0966ef09f8ae460306e5cf6c34db7c

  • SHA256

    b67018512894d3b3422f0f856756229ace8e18044e0db51a4141b078bc96cb1d

  • SHA512

    71c0c70816e38001bea26e3dabb881bf6ff22ce4e87a2150247d40bfb0c5d950c30e348a9411e3acacd6797a33d0973d2c6320e1473cbd28eb9661bdd4875ae7

  • SSDEEP

    6144:CPPrO426Ep+NQFj8YdCioiqBb1lo/GWyJusttUnVzfCN/WQ3EEs8Pl9Bnsz+d4:0r5FSfdZTUREGFpt0fw/WQ3EEs83mzw4

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dd79e364364aa64381242942fecbda3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0dd79e364364aa64381242942fecbda3_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Public\Downloads\Norton\{3A7FA539-8005-4603-87D2-SOS1-N360v4}\0dd79e364364aa64381242942fecbda3_JaffaCakes118.exe
      C:\Users\Public\Downloads\Norton\{3A7FA539-8005-4603-87D2-SOS1-N360v4}\0dd79e364364aa64381242942fecbda3_JaffaCakes118.exe /r
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\LC.INI

    Filesize

    157B

    MD5

    399cd4d4a226928f49c24798284a782d

    SHA1

    ca247b2e52ae971567fc038303b90a93dbd106c6

    SHA256

    70bc79a510da26449ae65913d8716eabc83add4ec98993b2fd520c4ae005b82f

    SHA512

    e1e7ebee3f90b8eefd1ed0f5e84d5d003303c58e8e29bd14ef018aeeea907ae32ea7a4fe1f423f97871e10be933a78d91cb2b7d163f1f756d59fcf6e36756a43

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2080292272-204036150-2159171770-1000\4bd07e1ba952c6aa9bf83a8d98c08949_50b25195-d6c8-43bb-b2ca-a8bd616967ef

    Filesize

    54B

    MD5

    9499c2f308410e48386f58ca7afccd2e

    SHA1

    e2ef9dec757aec938d801dd720fddc0c387da7af

    SHA256

    87e4fc1f82d5a89c7f10ca58cf5de66d184cc3ce02954a13ade3100414a3bc97

    SHA512

    ff68637e2b3b62cf6ca812bf4d067606edacb353825628048396c45e9be8ca7725c93787b8bcf82e610cf795f69a52b20d4ac48ade5405b114643af6515cf457

  • C:\Users\Admin\Desktop\Launch Norton Download Manager.lnk

    Filesize

    1KB

    MD5

    c19d9431461f95b32fc5c225301c9f5d

    SHA1

    1ebf975f3135aeefa1b56e9997727c27474fe648

    SHA256

    c37d9967b8ed7e2e70ae58fdc28713e537790f630676db30f7984b244fb66b42

    SHA512

    9afcb125e68099bf346524e2d03127ccbe0a96e58f355ac15168592376bf0b82b559f35ffe6388563186f077677a250c8cd41af26cab0e7abfd40ee74c24a433

  • C:\Users\Admin\Desktop\Norton Installation Files.lnk

    Filesize

    1KB

    MD5

    9db89198ec86499494bd0a7582e6dc4d

    SHA1

    8cda45806947a1516324e561eeb7304b15639eb3

    SHA256

    a80dbb4bb9a6d02d112a866d53b30f226de00cfa25143accca45ca7068c8adda

    SHA512

    91aff96d5d39a44a2cb6e1211f393e830ff8280985d82bc0b6bbff75dea58d5e7cbd27242c9ba85f1be41e648944e44195e20b5c7987f2d3d83c202cb3e0be5b

  • C:\Users\Public\Downloads\Norton\{3A7FA539-8005-4603-87D2-SOS1-N360v4}\0dd79e364364aa64381242942fecbda3_JaffaCakes118.exe

    Filesize

    398KB

    MD5

    0dd79e364364aa64381242942fecbda3

    SHA1

    32ea31863c0966ef09f8ae460306e5cf6c34db7c

    SHA256

    b67018512894d3b3422f0f856756229ace8e18044e0db51a4141b078bc96cb1d

    SHA512

    71c0c70816e38001bea26e3dabb881bf6ff22ce4e87a2150247d40bfb0c5d950c30e348a9411e3acacd6797a33d0973d2c6320e1473cbd28eb9661bdd4875ae7

  • memory/1504-20-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/1504-0-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/1504-1-0x0000000002180000-0x0000000002182000-memory.dmp

    Filesize

    8KB

  • memory/2088-21-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/2088-22-0x0000000000570000-0x0000000000572000-memory.dmp

    Filesize

    8KB

  • memory/2088-33-0x00000000021C0000-0x00000000021C1000-memory.dmp

    Filesize

    4KB

  • memory/2088-34-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/2088-36-0x0000000000570000-0x0000000000572000-memory.dmp

    Filesize

    8KB

  • memory/2088-37-0x00000000021C0000-0x00000000021C1000-memory.dmp

    Filesize

    4KB

  • memory/2088-38-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/2088-46-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB