Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/06/2024, 00:08

General

  • Target

    10092c825f3ec73c13771a528bbb2fe3_JaffaCakes118.exe

  • Size

    599KB

  • MD5

    10092c825f3ec73c13771a528bbb2fe3

  • SHA1

    b53e0c5d7961283accb4329e933551f412ee27d8

  • SHA256

    4ccedbf94c6e7b14e7167e579674b71fa2a494422b6a558651925ca4a39efb82

  • SHA512

    03db194bd6c4d92634cc94f1594fd84f8e32cc6d53b5d7ad8d1c518f4dc59d3e6f05d9d843be7e3dea74df38c2e79bd7f543e76900cb21cb02c069f7af2df32f

  • SSDEEP

    12288:CAVYdhvXzYUIjrZ/mVVuY7vACnnVL9rw6Z174CZBIpR+kyCLwFGiljzIi:LVMaPKXn1xwMxXAplyCLnixz

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10092c825f3ec73c13771a528bbb2fe3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\10092c825f3ec73c13771a528bbb2fe3_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\SysWOW64\wbem\svchost.exe
      "C:\Windows\system32\wbem\svchost.exe" /install /silent
      2⤵
      • Sets service image path in registry
      • Executes dropped EXE
      PID:380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\wbem\svchost.exe

          Filesize

          221KB

          MD5

          d32db6218486e43e6c20e39c92743017

          SHA1

          1d00856b84d3b2aa80bf4875fb160da7c557d585

          SHA256

          4d43113017f36a506af8fb25fe6f82d18cf113c9ef91024bfff588b8cdb41cc5

          SHA512

          9acdb6dc6028e44a49de4a7b3d86f4968a5aafb009681cd7323bb46a8fed2c48de7083ca82974530caeb32a5066224c73fd2f25456a656036bd6966fc67014e7

        • memory/380-11-0x0000000000400000-0x000000000048F000-memory.dmp

          Filesize

          572KB

        • memory/380-12-0x0000000002760000-0x0000000002761000-memory.dmp

          Filesize

          4KB

        • memory/380-13-0x0000000000400000-0x000000000048F000-memory.dmp

          Filesize

          572KB

        • memory/5060-0-0x0000000000400000-0x00000000004B5000-memory.dmp

          Filesize

          724KB

        • memory/5060-14-0x0000000000400000-0x00000000004B5000-memory.dmp

          Filesize

          724KB