Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 18:31

General

  • Target

    35e33bb27519b401fcb476114b53545a_JaffaCakes118.exe

  • Size

    10.1MB

  • MD5

    35e33bb27519b401fcb476114b53545a

  • SHA1

    37a4c1fa21b6507e8f3d1b1a290efc91b98a5770

  • SHA256

    d0429c9b3ec2c80fff2e77d8398d6497759c79bc864eae4b7172057ad0982585

  • SHA512

    290090ff12481b573009c085dbe4848a777254f73edf55bc385c1a04ffbd192ff22298c9f14f58707f31615cc57aab7035a836b93bf2766c94abef461e402dff

  • SSDEEP

    98304:/bI/3Hp22yGRXx7skk8ESkjLhTFiVVs+K:/s/522xXx7skk8FkpTFgs

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35e33bb27519b401fcb476114b53545a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\35e33bb27519b401fcb476114b53545a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\windows\system32\go.bat" "
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo y"
        3⤵
          PID:2684
        • C:\Windows\SysWOW64\cacls.exe
          cacls c:\progra~1\gbplugin /G everyone:F
          3⤵
            PID:1928
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo y"
            3⤵
              PID:4896
            • C:\Windows\SysWOW64\cacls.exe
              cacls c:\progra~1\gbplugin\* /G guest:F
              3⤵
                PID:4844
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram C:\windows\system\Plugin.exe RPCCC
              2⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:3688

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\windows\SysWOW64\go.bat

            Filesize

            266B

            MD5

            47f61f21deb81f981340e1e452480900

            SHA1

            542ae5ca2819ab270562103964ba4af9aad705ad

            SHA256

            f2e34e72f79cbe65e989bbfa52f1fe1e90dbfac74ee0efc2061593d2e094de66

            SHA512

            071e0488b033bf71caeb6c511e0e6e288ff8585e98d226e0e94d7f5269005cabd5072ec16d47e0b3908fdd074286160b7831186941bf08151348bd2e33a5b87c

          • C:\windows\system\Plugin.exe

            Filesize

            10.1MB

            MD5

            35e33bb27519b401fcb476114b53545a

            SHA1

            37a4c1fa21b6507e8f3d1b1a290efc91b98a5770

            SHA256

            d0429c9b3ec2c80fff2e77d8398d6497759c79bc864eae4b7172057ad0982585

            SHA512

            290090ff12481b573009c085dbe4848a777254f73edf55bc385c1a04ffbd192ff22298c9f14f58707f31615cc57aab7035a836b93bf2766c94abef461e402dff

          • memory/3232-14-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-9-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-10-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-11-0x0000000000F70000-0x0000000000F71000-memory.dmp

            Filesize

            4KB

          • memory/3232-12-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-13-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-0-0x0000000000F70000-0x0000000000F71000-memory.dmp

            Filesize

            4KB

          • memory/3232-15-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-17-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-18-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-19-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-21-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-22-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB

          • memory/3232-23-0x0000000000400000-0x0000000000E1E000-memory.dmp

            Filesize

            10.1MB