Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 18:20

General

  • Target

    3e61a2af45f4112f2727437112e23a4d_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    3e61a2af45f4112f2727437112e23a4d

  • SHA1

    237b998f32e2cd33df5a104a2f3a3b4b493a4fc0

  • SHA256

    151ecf48fa2d609b74bd49245cfd44688c0238171d40715333f56b12546fe9f7

  • SHA512

    777fec0af2a265ddd5a1cb79619a823e5b8b2e74d39435ef0d96b3109521127cacbb75a3e5cd49094d065ffe5b226a68afe670615cda75cc861229c7b144e6ef

  • SSDEEP

    768:4ivR95RwDKtqfNJSFzo/8Bt2Xiz7bYoh8T0Bz4rVqc1s7GPAyeGYbpae2o7CDZ:4q95btqfNUiGt2G8IBW9TAynYb3gDZ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 47 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e61a2af45f4112f2727437112e23a4d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e61a2af45f4112f2727437112e23a4d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\MSV\nvs8E2.tmp.bat" "
      2⤵
      • Enumerates connected drives
      PID:1780
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i \XAe.msi /quiet
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      PID:4680
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\inlD76.tmp
        C:\Users\Admin\AppData\Local\Temp\inlD76.tmp cdf1912.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3224
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlD76.tmp > nul
          4⤵
            PID:988
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3E61A2~1.EXE > nul
        2⤵
          PID:392
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding C5BC8741DF0210B6D67E71A6E0BF1497
          2⤵
            PID:2012

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e590eaf.rbs

          Filesize

          8KB

          MD5

          6139fac95e6e84c84563fc6deb8f5704

          SHA1

          2c1ffdb2d37de037e605d9cedb943b30ce0de676

          SHA256

          614b209dc9dc8343140467a109266d2a446a715b9bcc9837fd958d33abc8c68e

          SHA512

          f4353cf0af34439d9db24ae275ae4e93b9e9ae6ad9dba1a094640344d85601374324e30e9dd871e1a64808aad230609749050f5c995163211f07759c4f85fc29

        • C:\Users\Admin\AppData\Local\Temp\cdf1912.tmp

          Filesize

          768B

          MD5

          d20d9eda31a2d0300e4589df7f352370

          SHA1

          79b46d2dbb489914cfedafdbc90e62951471b48e

          SHA256

          d7a1d6a8cf5c3fbb85cd06147a599f5274630b86b1c89721f10a60c1bbe994d8

          SHA512

          d28c5b69325a9833776ea362445b77b231a0ec9b9b8b4a2ad37a434ee8b2b0c1903d6ade1e372f73ac8ada951e0a24076cf23d9307d27fed5927f4bf8b0d0a5e

        • C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat

          Filesize

          56B

          MD5

          9bb9727ec7ff3e2d82007ce985a1e5b3

          SHA1

          d5de37ef1c07c3c40f660464423ec45025e4ad94

          SHA256

          c995c7cb0f4531750de6301421bd2c22ad0a9c4cc0c949b1677c58aef7917c35

          SHA512

          8f93a95d1869562eb7035d172a78cdcb419e511f3b7362035c77c36f7955a515c2a6f7c70b00059ac1d60e5a93bfa131defcdd25847ef55e360b5e6d5d0f2587

        • C:\Users\Admin\AppData\Roaming\MSV\nvs8E2.tmp.bat

          Filesize

          2KB

          MD5

          cc026bb8e7fc24bcac4b127fd0eab984

          SHA1

          f32b1c8d9bf80b56f2dbec1c27f72f05188e5ba4

          SHA256

          add1523a20de316094784a5ff5ef21bfff6cfcc1d7ba5c34a3b1bd77f9762f7f

          SHA512

          0bdf850bb49b0ffcce90aa0c3713b12204769bb79615ed52d8a6b7a0081874b3137108510e2e560d4c5106e3796205065182935007d28a8eee3ebdc33d1064e0

        • memory/3224-60-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4436-0-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/4436-1-0x00000000000D0000-0x00000000000D3000-memory.dmp

          Filesize

          12KB

        • memory/4436-5-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/4436-7-0x00000000000D0000-0x00000000000D3000-memory.dmp

          Filesize

          12KB

        • memory/4436-32-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB