Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2024, 01:52

General

  • Target

    4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe

  • Size

    526KB

  • MD5

    4c534640c1640866fb3f340b7f2f097b

  • SHA1

    87335d6780313da3243963768c56a1d57da4ffba

  • SHA256

    74f7681392fa6d1d6c62467d8a9b3ab60df26820ce60fad04585b7cb68d444b1

  • SHA512

    7b66b294999d9266a476e40e0b263197a499207a7d82c7cf22b1ad55bf458a281dc967b273255665f2232c4698365ac483735412bd7248ecc8c8e17a543e3ab5

  • SSDEEP

    12288:FVpo70X4yQySH6u40Prkl84/0zGoPqLbI16MMcxwireV:F3+0Xh46N+2czaPE6MHxw7

Score
8/10

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe
      "C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:996
    • C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe
      "C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe"
      2⤵
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Users\Admin\AppData\Local\Temp\~24065665.exe
        C:\Users\Admin\AppData\Local\Temp\~24065665.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
            PID:3008

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe

            Filesize

            540KB

            MD5

            59e20e2ec60d5946ad54b64a3deb1c83

            SHA1

            7027c9308b7b2d14ff9fd7b81efa81a1c9a0ec68

            SHA256

            538c299746b0afa502968f74f13220069a204e06d008c429a19762ee7ae097bc

            SHA512

            283824f4d63fdef8eba6a078dc7dcaff401cc13aee6e3c970f0505772b4b1525e2ad805dc2e90b3140f3d9523ea7db575eaf860db60f6c2b4a8edb289d447aa9

          • C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe

            Filesize

            29KB

            MD5

            1a3440da9f8f5cad3319d8b2e17772be

            SHA1

            fb3c6ec93d7d15228f77d71651a8f24a1a35facf

            SHA256

            09c7ece20c9b50b0d272cc40c45a965d289a9ae73441a0b893de3c9532aeeae3

            SHA512

            b22e08e4fc4a4acb760a3d56992b9d73f1ccb5ac2eaff04f66587b55b3a3396f3760840c50e7800f1e51cd95ef95f6d70a41e6c3766ed60cb41ada85920c5e23

          • C:\Users\Admin\AppData\Local\Temp\~24065665.exe

            Filesize

            8KB

            MD5

            1c85b838536b8027027ed9a9019f6e57

            SHA1

            193086e31000ad275b91798e6ab2bf1823f28fb7

            SHA256

            513684483d92bef7b9ea5f279b47cededbfa059bd7688f0944cd9c3e0a7c4c3c

            SHA512

            7fa2da850652713edc6e187d0014f12ae877d8f6699160a4e0b1ed6d8163279316ace4d81373ee98f22a7f5b816f81a531af1a23c0e9ebb35546e9f8e0d9e25c

          • memory/996-23-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/996-65-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-45-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-59-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-30-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-51-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-35-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-49-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/996-17-0x0000000000400000-0x00000000004E7000-memory.dmp

            Filesize

            924KB

          • memory/1476-22-0x0000000000400000-0x0000000000485398-memory.dmp

            Filesize

            532KB

          • memory/1476-0-0x0000000000400000-0x0000000000485398-memory.dmp

            Filesize

            532KB

          • memory/4452-34-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4452-46-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4452-36-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4452-33-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4452-31-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4452-21-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB