Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 16:16

General

  • Target

    31151a90a011c05239d9382943fd972a_JaffaCakes118.exe

  • Size

    5.3MB

  • MD5

    31151a90a011c05239d9382943fd972a

  • SHA1

    c28823aa1a26411782937e5ee7dcdbbb5d844d66

  • SHA256

    e60aea3de7a184da9ffe6ab259ac9d8df4f766b7073425e1b9a0c38cba47e6a0

  • SHA512

    e206e29f44cc239833416cda5433c59ed3ec4a74a78c5c2c5afe7b4c82903126c99dc1398ac56570a6fa5e6ba551ec80ee29a6830bb50eb201688e3a5c238f90

  • SSDEEP

    98304:Kg8H+KNKS6r/5rdZhydaId1qqnkdSaNkMS+fHAy0VHzZlh3zXW4Y:J8HT6r/5xZ0dp1qqnk4aeMS+fgymlTmt

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 62 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 8 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31151a90a011c05239d9382943fd972a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\31151a90a011c05239d9382943fd972a_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C taskkill /f /im "Funshion.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "Funshion.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3712
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C taskkill /f /im "FSPServer.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "FSPServer.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4904
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C taskkill /f /im "FunshionService.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "FunshionService.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C taskkill /f /im "Updater.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "Updater.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C taskkill /f /im "FunshionUpdate.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "FunshionUpdate.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C taskkill /f /im "FunshionUpgrade.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "FunshionUpgrade.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3200
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Windows\system32\quartz.dll"
      2⤵
      • Modifies registry class
      PID:4352
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C rename "C:\Users\Admin\funshion\historyTorrent\*.torrent" *.fsp
      2⤵
        PID:4792
      • C:\Users\Admin\AppData\Local\Temp\xml2fspdata.exe
        "C:\Users\Admin\AppData\Local\Temp\xml2fspdata.exe" "C:\Program Files (x86)\Funshion Online\Funshion\control\\"
        2⤵
        • Executes dropped EXE
        PID:3668
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C taskkill /f /im "funshionupgrade.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im "funshionupgrade.exe"
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3568
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\Funshion Online\Funshion\FunshionAddr\funshionAddr.dll"
        2⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\PROGRA~2\FUNSHI~1\Funshion\FUNSHI~1\ASBarBroker.exe
          "C:\PROGRA~2\FUNSHI~1\Funshion\FUNSHI~1\ASBarBroker.exe" -RegServer
          3⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:3940
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C taskkill /f /im "funshion.scr"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im "funshion.scr"
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\FUNSHI~1\Funshion\FUNSHI~1\ASBarBroker.exe

      Filesize

      128KB

      MD5

      aecf47200f80613e5aeed4285441ade5

      SHA1

      a1006ab28a7c3c43beadcf72dc148be33ef90fab

      SHA256

      796c475af15f5f7d179a2a490901617a958e4063781a2443c4c8ce95688e8756

      SHA512

      c8550608c8a06108cbcf097fb94011d1928bd6439d830ac78aadab4e31d0e50b23b791552553acd3e731399b94cfa8a7947f2505eb48bf095eee62173a45ec0f

    • C:\PROGRA~2\FUNSHI~1\Funshion\FUNSHI~1\conf.xml

      Filesize

      259B

      MD5

      879fcee362a01be6ad2cc994fea5e09d

      SHA1

      974bd6211cb91911c16964c852d746d62da9d684

      SHA256

      168e3418ab45d3221834d7d1ef71bec2ca435476a8f65d6660c38b298b5cbe34

      SHA512

      4dabd2643f3280b0778d3edae4512b6d772b06a5e0b81a1c99909455a4ec1345b53acd2f1fcb46726e371329213c3af4018831596b2b6da0eb8f9879631df1c4

    • C:\Program Files (x86)\Funshion Online\Funshion\Funshion.exe

      Filesize

      2.8MB

      MD5

      f35d3a5736a0ecb3d6f4f18d7966476c

      SHA1

      bed47a42657fbd2cf5732d5a42d9e8c0865f2145

      SHA256

      53df592d425002c866236e2e2ed1cbb38f8c186fae2a0d98024a99e85a9cc26c

      SHA512

      781fd703e7aabba1757ef913608954fdd67f47c8a9c4c185ecd92bbfe73dd25a6f9ca234958f395ad0e3318f0beec41af85ddfed39baaa1a269907567bf3b9c9

    • C:\Program Files (x86)\Funshion Online\Funshion\FunshionAddr\funshionAddr.dll

      Filesize

      1.1MB

      MD5

      e2f76eb0a099a8472196bb922b86353b

      SHA1

      59f7a982c73277463942ebd4e1ccc6204436cc6d

      SHA256

      255c95b7dfc1f56d0c745064d07c264cd94ba8415e3be835a7a0dadafb936965

      SHA512

      578af8e2c68295d3ef010613cd065e4985bb488d4d3507cbb7d9c8c491f2d13ef5ae4941dbe1a02287c813144c9dfdeec7b6c590dd0e4ec626459f4e7257af26

    • C:\Users\Admin\AppData\Local\Temp\getmacaddress.dll

      Filesize

      154KB

      MD5

      43d6ea2d92057a5bee55a24da663c5d1

      SHA1

      2aee91ec9978b47aa897332a60ad53eaf47b3629

      SHA256

      b54029ec6385605fac85067be8573f6fb97fe9958ab527789b145efbf5133445

      SHA512

      94a1f3622cb5e6a329b1eb9dd6a11f41515ac56417fb48aa661dd5fe32b6571a7cd73303b82def40c7e99067b6766206ad0abfa31b865ffe383c45aea79f5e1a

    • C:\Users\Admin\AppData\Local\Temp\nicdescr.dat

      Filesize

      1KB

      MD5

      0fb9927e7a9ca8c5f5af8bb4fd7857df

      SHA1

      40b512129c1d3de5b11c81300e0cbeb781f06873

      SHA256

      52348ac96775f546a3d057edf50aaf69e0aeb03edc7972055496c014c31dc738

      SHA512

      331228608c543b66e04e6d9960b51ed1b26bbaad4d48a9254121618cfca31e2a68d194aa1bde071b1a4e3d03d27174dbc5efcc5a7e0cb5a5064c9cee270609ab

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\ExecCmd.dll

      Filesize

      4KB

      MD5

      b9380b0bea8854fd9f93cc1fda0dfeac

      SHA1

      edb8d58074e098f7b5f0d158abedc7fc53638618

      SHA256

      1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

      SHA512

      45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\ExecDos.dll

      Filesize

      5KB

      MD5

      a7cd6206240484c8436c66afb12bdfbf

      SHA1

      0bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919

      SHA256

      69ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926

      SHA512

      b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\FindProcDLL.dll

      Filesize

      31KB

      MD5

      83cd62eab980e3d64c131799608c8371

      SHA1

      5b57a6842a154997e31fab573c5754b358f5dd1c

      SHA256

      a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

      SHA512

      91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\KillProcDLL.dll

      Filesize

      32KB

      MD5

      83142eac84475f4ca889c73f10d9c179

      SHA1

      dbe43c0de8ef881466bd74861b2e5b17598b5ce8

      SHA256

      ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

      SHA512

      1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\NSISdl.dll

      Filesize

      14KB

      MD5

      a5f8399a743ab7f9c88c645c35b1ebb5

      SHA1

      168f3c158913b0367bf79fa413357fbe97018191

      SHA256

      dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

      SHA512

      824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\System.dll

      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • C:\Users\Admin\AppData\Local\Temp\nsbEFFF.tmp\md5dll.dll

      Filesize

      8KB

      MD5

      a7d710e78711d5ab90e4792763241754

      SHA1

      f31cecd926c5d497aba163a17b75975ec34beb13

      SHA256

      9b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2

      SHA512

      f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0

    • C:\Users\Admin\AppData\Local\Temp\xml2fspdata.exe

      Filesize

      122KB

      MD5

      e658e684b19c7dbacf1d197c3fdb0265

      SHA1

      5fe48fc190f65d44090854a7549925e19bd81b61

      SHA256

      434ad3a94e2686eee117d140302a089b12caec2a1e29bfb8dbf9004d555f7c33

      SHA512

      87d554df3720ba8e3da89fa1cd60184a3e4eb906281adfeac7cccd375837b53001bfc7dd1a6dcdad2a6caa39b3950df5e938dae6c1f5e24e425a69153dcdea1f

    • C:\Users\Admin\funshion.ini

      Filesize

      387B

      MD5

      f38281c8c49f187c34a3f7a1083fe537

      SHA1

      cbc9207ae48bedbc74c4776e2c7bafd715c910d6

      SHA256

      2aad1a30f28d330206cff40ba9593d51fae8d0b36d736334c905cb4ced89692f

      SHA512

      0985ca038d13624fce6df30a419c1c37caa10b0c7ef9ef9d16eb74d48306a6d5814a0737345abd42dfe043ff292b43968a726fea65fb101ce4bf96514b4e8ab0

    • C:\Users\Admin\funshion.ini

      Filesize

      624B

      MD5

      4d3a0021f10e906e2d45fe375b412040

      SHA1

      13f1cb7cd04e923cf72e2ec1e7a7a610b0f1a7d7

      SHA256

      5894aaebbf5ed8aa91579a6ea786272d33829aee6393b83924fe9fb90c2101b3

      SHA512

      beb55afbe6344a4832d9cf9e47576fbc51b4145d19109b4f7b6de3dd38eafb9942f5e65769835e340e61eb6d146bb61b59b3e3fb697fbcff0bdf64423e8236e5

    • C:\Users\Admin\funshion.ini

      Filesize

      811B

      MD5

      7c3e0a26301bd1b711532c474f00758f

      SHA1

      f0cab2192cf5825d9150bf2435b7273e903807d7

      SHA256

      99b20512df1b4c389adb5c1c7c787d416a8d6570fca1b463fa646afe1a6fbbf7

      SHA512

      1b85b0ad32fd7c60014a4667fea17f15d27feab33734460c439c4739598af229ec4c916fedf0b6dcf3ce7f46b1f0a05982736fd6c95f6dde27832c34056970ec

    • C:\Windows\SysWOW64\funshion.ini

      Filesize

      452B

      MD5

      7a9e668ade8b0d7916a35b0d98eeb72b

      SHA1

      620cda4ab541e736dfea0192a2d303161a913610

      SHA256

      0df2ad4d9a24fa86a2d046fc586dd8005c489577be3fff4fb356069c703c80a2

      SHA512

      22bf785c3b7dafd73346fbc6b0378c84dd950f47209b1026424adaa941ff666730e72697862350acbdb9ddf4b2c29dcc2d31cc5da6816139a7f0cd934ea61493

    • memory/4608-482-0x0000000003680000-0x00000000036A8000-memory.dmp

      Filesize

      160KB

    • memory/4608-459-0x0000000003680000-0x000000000368B000-memory.dmp

      Filesize

      44KB

    • memory/4608-115-0x0000000003010000-0x0000000003038000-memory.dmp

      Filesize

      160KB

    • memory/4608-10-0x0000000002F00000-0x0000000002F0B000-memory.dmp

      Filesize

      44KB