Analysis

  • max time kernel
    142s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 16:26

General

  • Target

    28d254a496ea25d76ce050660729f3c8_JaffaCakes118.exe

  • Size

    566KB

  • MD5

    28d254a496ea25d76ce050660729f3c8

  • SHA1

    978d1ef89001f7f14cd4f102a15f6b46081c6751

  • SHA256

    c59c18417e8a553badccd25aca58b9c00940b7c62213312f47a17cfa5598771b

  • SHA512

    9451d1a1baec68f1c26e109e471d2df78271636cf83f84a66f2b03dd46c080fa0442b6df4d4974b73c63dd0df05f5a67a02e1c560fdff4a734e08a5e85130f91

  • SSDEEP

    12288:KwIF1USG3JtjroKH2MSXg3ZkeiT7oFN8zYNalVCvWKCenlotrcM1hQcDI+:ZIFOScLo8ZkXYTiVCvWJMYJn

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 11 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28d254a496ea25d76ce050660729f3c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28d254a496ea25d76ce050660729f3c8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Program Files\WinAntivirusPro3.8\WinAntivirusPro.exe
      "C:\Program Files\WinAntivirusPro3.8\WinAntivirusPro.exe" "C:\Users\Admin\AppData\Local\Temp\28d254a496ea25d76ce050660729f3c8_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\NetFilter\netfilter.dll

    Filesize

    465KB

    MD5

    712913163825319c730f199676231eb1

    SHA1

    b36ec0769c01aee378dd41c36ac7570b71b6bf42

    SHA256

    e96f76cad733b2d2a622b4e58f7045ab230571e75c9d2cf06d8fb4d940184846

    SHA512

    cd3f8d7f7b8a8384947cc48e429afc3aa666efca2a03e74792de674c6e13558dfbc8c844b9f12fd5c341364dcf7b8227ada0496efae03d0a6ed15f522b45f3ac

  • C:\Program Files\WinAntivirusPro3.8\WinAntivirusPro.exe

    Filesize

    566KB

    MD5

    28d254a496ea25d76ce050660729f3c8

    SHA1

    978d1ef89001f7f14cd4f102a15f6b46081c6751

    SHA256

    c59c18417e8a553badccd25aca58b9c00940b7c62213312f47a17cfa5598771b

    SHA512

    9451d1a1baec68f1c26e109e471d2df78271636cf83f84a66f2b03dd46c080fa0442b6df4d4974b73c63dd0df05f5a67a02e1c560fdff4a734e08a5e85130f91

  • memory/816-27-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-28-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-38-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-19-0x00000000006D0000-0x00000000006D1000-memory.dmp

    Filesize

    4KB

  • memory/816-37-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-22-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-24-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-25-0x00000000006D0000-0x00000000006D1000-memory.dmp

    Filesize

    4KB

  • memory/816-36-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-35-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-29-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-30-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-31-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-32-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-33-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/816-34-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/2180-7-0x0000000000C80000-0x0000000000CFA000-memory.dmp

    Filesize

    488KB

  • memory/2180-0-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/2180-18-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/2180-1-0x0000000000C40000-0x0000000000C41000-memory.dmp

    Filesize

    4KB