Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 13:42

General

  • Target

    1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    1a5709a9fa14ec04f92422407f5f246e

  • SHA1

    fe7e13edfdd092a11f21489de845eb4f6c1ac0b5

  • SHA256

    1c3669d375ddc4dbb85d8c98959ccebc65173009779b19ce8256e6d971baebe7

  • SHA512

    5c599af9790d5567576dce554dc77004d7d2ac4297318224e15062745c83382d7d15f3d7c90a7e642cc9f56d8bae1fa497bab91c9af059ba76ad8fb81762867f

  • SSDEEP

    3072:AQIURTXJwVp5lL8RDRBXUlSdW9cpK4vwbxrG:Asml45PXUlSdWOpfWxrG

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C at 19:25 /every:M,T,W,Th,F,Sa,Su ""C:\windows\cdi.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Windows\SysWOW64\at.exe
        at 19:25 /every:M,T,W,Th,F,Sa,Su ""C:\windows\cdi.exe""
        3⤵
          PID:5024
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C at 19:30 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dss.exe""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3844
        • C:\Windows\SysWOW64\at.exe
          at 19:30 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dss.exe""
          3⤵
            PID:324
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C at 19:35 /every:M,T,W,Th,F,Sa,Su ""c:\windows\bch.exe""
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Windows\SysWOW64\at.exe
            at 19:35 /every:M,T,W,Th,F,Sa,Su ""c:\windows\bch.exe""
            3⤵
              PID:1572
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C at 19:40 /every:M,T,W,Th,F,Sa,Su ""c:\windows\hti.exe""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Windows\SysWOW64\at.exe
              at 19:40 /every:M,T,W,Th,F,Sa,Su ""c:\windows\hti.exe""
              3⤵
                PID:4396
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /C at 19:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\xtr.exe""
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2244
              • C:\Windows\SysWOW64\at.exe
                at 19:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\xtr.exe""
                3⤵
                  PID:3636
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:3856

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\nss3EFA.tmp\inetc.dll

                Filesize

                20KB

                MD5

                f02155fa3e59a8fc48a74a236b2bb42e

                SHA1

                6d76ee8f86fb29f3352c9546250d940f1a476fb8

                SHA256

                096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

                SHA512

                8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

              • C:\Users\Admin\AppData\Local\Temp\nss3EFA.tmp\nsExec.dll

                Filesize

                6KB

                MD5

                acc2b699edfea5bf5aae45aba3a41e96

                SHA1

                d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                SHA256

                168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                SHA512

                e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

              • C:\Windows\hti.exe

                Filesize

                69KB

                MD5

                b7603c02e4711a0c2ba60165a07913f7

                SHA1

                b604896b3843ae812bac4dd800875d55b710b004

                SHA256

                cc3fb2dc03a5bdc7d5019645c9087f437547b16f877503022c65e5b069ac4276

                SHA512

                4f4127abb5efcad3a26998206bc062a0d9e591d16ae15bb5e6a2123aadc857e007fb237f64e3d4312e474491c20610cb58ec199f84bd0b8ccb0b7025da9d15be