Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 09:10

General

  • Target

    492448878a7f702165b019cc71f676c9_JaffaCakes118.exe

  • Size

    99KB

  • MD5

    492448878a7f702165b019cc71f676c9

  • SHA1

    126e8a7ea1f5cddf5a9f4a20a03539291f03474b

  • SHA256

    d892d750e4e55a63b386b7a2a7767af342eecc282b468d5c1f3c29c4763d567a

  • SHA512

    acf6b482585fcf9839af47004d81b4efba9fb68b5bb1fbaeaabe112a65e6e5a77d5488901ac6e633557a76e5d5f4d557d83f98b79aeac6ce35a0796d01b2a7e0

  • SSDEEP

    1536:adzCU+0hp8ocjK5b3jzvQXp9rZkCRn48N/oNL0Cx8YJabmGDf/EIpY0BEdsVhz06:alC278Ozv4hRnZNASCraHDf/Ex0KsGna

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\492448878a7f702165b019cc71f676c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\492448878a7f702165b019cc71f676c9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\vrgeixreg.dll",polmxhat
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:5360
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe -s "C:\Users\Admin\AppData\Local\Temp\vrgeixreg.reg"
        3⤵
        • Sets service image path in registry
        • Runs .reg file with regedit
        PID:5384
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" "C:\Program Files\Common Files\Microsoft Shared\vrgeix.dll",polmxhat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vrgeix.dll

    Filesize

    71KB

    MD5

    fcf5a74060daacc685b4028b521dd10c

    SHA1

    7e980ee7df9b96fce90757f19f2972c8568b24a3

    SHA256

    50ecdd81bcb06ed111431200a8c75cfccbb67f3bbff5a0bd2bad4721079b7581

    SHA512

    50bab7bc421668618dad749981a7cc620969744363cae266ba2990b2aec690093259735432affc5eb570fe6a7aa9f3b142186bbc8d2e81f0edca3ae52b1acd8c

  • C:\Users\Admin\AppData\Local\Temp\vrgeixreg.reg

    Filesize

    1KB

    MD5

    c23ac01fc7adee94f86afaf5497afd3a

    SHA1

    d128ff9a9519db48cae29cfd6d328ff57f754717

    SHA256

    154e85c1f61a1ddb67863887b8b2112cec0714b9aae8fea8988f50c54668a882

    SHA512

    e2ff2a65d7dbeea8d5a510637d987bcba2a68c227157fcb9da90a20108d11cc9273027a66b06bcca41d170bc9fa9b267ee64d759a3a4550d7a17093a81320eb8