Analysis

  • max time kernel
    91s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2024, 07:55

General

  • Target

    4d6ba37c7c16f6174534dab16056ba2b_JaffaCakes118.exe

  • Size

    823KB

  • MD5

    4d6ba37c7c16f6174534dab16056ba2b

  • SHA1

    d5f2baff0fe0669b024ef93d3aae44ed830fa623

  • SHA256

    1cf630275f6f4073ba9dacd900fc9534ac81485682a23113e11a63a535c858da

  • SHA512

    cc6aca6739abb56cbed99858eaa193cedeb277c5b7dd30c5144432eaba1364435ba76b320e384e867de36e8bd45b72cd89b69f2ee7047051de6be5bd42b1fc4d

  • SSDEEP

    12288:LqSdxqNdaASdjqSdxqNdaASdjqSdxqNdaASdjqSdxqNdaASdjqSdxqNdaASdtyQZ:/H4aA8H4aA8H4aA8H4aA8H4aAInabi

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d6ba37c7c16f6174534dab16056ba2b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d6ba37c7c16f6174534dab16056ba2b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ELOY229472EL.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ELOY229472EL.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\nvdisp.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\nvdisp.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1364
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 788
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:3396
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1588
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3896

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ELOY229472EL.exe

          Filesize

          138KB

          MD5

          e09629b0de8cda1df7adb4d1db07e9a3

          SHA1

          d67b6c947a98fb2206e01b7cd789018743152f69

          SHA256

          11e20ce47584904b4e140f1d1a1e9814ebb9ac062f1c4058980b4ae697da44a5

          SHA512

          ab986840626ce8c237d1b10086a9eca49dc3cc19534789d552ad23b506ed0d0aff883c05ed3cac40fdc236495097943f03dfde90adcc6d28dc6d53fd5dc96d2e

        • memory/432-32-0x0000000075080000-0x0000000075631000-memory.dmp

          Filesize

          5.7MB

        • memory/432-11-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/432-12-0x0000000075080000-0x0000000075631000-memory.dmp

          Filesize

          5.7MB

        • memory/432-29-0x0000000000430000-0x00000000004F9000-memory.dmp

          Filesize

          804KB

        • memory/1364-46-0x000000001F450000-0x000000001F75E000-memory.dmp

          Filesize

          3.1MB

        • memory/4288-31-0x0000000075080000-0x0000000075631000-memory.dmp

          Filesize

          5.7MB

        • memory/4288-1-0x0000000075080000-0x0000000075631000-memory.dmp

          Filesize

          5.7MB

        • memory/4288-0-0x0000000075082000-0x0000000075083000-memory.dmp

          Filesize

          4KB

        • memory/4288-2-0x0000000075080000-0x0000000075631000-memory.dmp

          Filesize

          5.7MB

        • memory/4544-13-0x000000001AFE0000-0x000000001B086000-memory.dmp

          Filesize

          664KB

        • memory/4544-18-0x00007FFFAF435000-0x00007FFFAF436000-memory.dmp

          Filesize

          4KB

        • memory/4544-19-0x000000001B640000-0x000000001BB0E000-memory.dmp

          Filesize

          4.8MB

        • memory/4544-34-0x000000001BE30000-0x000000001BE7C000-memory.dmp

          Filesize

          304KB

        • memory/4544-33-0x000000001B0C0000-0x000000001B0C8000-memory.dmp

          Filesize

          32KB

        • memory/4544-30-0x00007FFFAF180000-0x00007FFFAFB21000-memory.dmp

          Filesize

          9.6MB

        • memory/4544-35-0x00007FFFAF180000-0x00007FFFAFB21000-memory.dmp

          Filesize

          9.6MB

        • memory/4544-45-0x00007FFFAF180000-0x00007FFFAFB21000-memory.dmp

          Filesize

          9.6MB

        • memory/4544-24-0x000000001BBD0000-0x000000001BC6C000-memory.dmp

          Filesize

          624KB