Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 08:57

General

  • Target

    27fa4bdccb56b6c5b9b602dac0065719_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    27fa4bdccb56b6c5b9b602dac0065719

  • SHA1

    e710030cd25e2e1ed12f387d76d0416af0ff8cb7

  • SHA256

    d5c2aa1a0febdf6ed73f621be07393db70c0ac922a96afd0d7c95430f2158a71

  • SHA512

    4fa0c87d6f9064871dfa70aa4eb6307b00603b854da3063e2a0b0c83b426bbc650c619340bf8ec1f457eb39f83848ca77abe2495af6236f29724876d2baa5c78

  • SSDEEP

    24576:3+0Yiwb7U4XW8RYqaL/+dh8R8Wb9mKz8zbfDmEJ3xCDCAH:3+zjxKNF/b9EBJB/a

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27fa4bdccb56b6c5b9b602dac0065719_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27fa4bdccb56b6c5b9b602dac0065719_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5112
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c netsh.exe firewall set opmode mode=enable profile=all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\SysWOW64\netsh.exe
        netsh.exe firewall set opmode mode=enable profile=all
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:3528
    • C:\Windows\SysWOW64\net.exe
      net stop SCMonitor
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop SCMonitor
        3⤵
          PID:3912
      • C:\Windows\SysWOW64\net.exe
        net stop scupdateservice
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1252
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop scupdateservice
          3⤵
            PID:3696
        • C:\Windows\SysWOW64\net.exe
          net stop SCScheduler
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop SCScheduler
            3⤵
              PID:4884
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /u /s "C:\Program Files (x86)\SecureIT\bsPopupBlocker.dll"
            2⤵
              PID:812
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32 /u /s "C:\Program Files (x86)\SecureIT\PopupBlocker.dll"
              2⤵
                PID:4652
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /DELETE /TN SCControlPanel-task /F
                2⤵
                  PID:2364
                • C:\Windows\System32\reg.exe
                  "C:\Windows\System32\reg.exe" delete HKLM\software\secureit /f
                  2⤵
                  • Modifies registry key
                  PID:620
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /DELETE /TN scscan /F
                  2⤵
                    PID:2236

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/5112-0-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5112-1-0x0000000000400000-0x00000000005B9000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/5112-2-0x0000000000400000-0x00000000005B9000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/5112-3-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5112-4-0x0000000000400000-0x00000000005B9000-memory.dmp

                        Filesize

                        1.7MB