Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 20:17

General

  • Target

    613f632a951664ef1facb0d9a6052270_JaffaCakes118.exe

  • Size

    242KB

  • MD5

    613f632a951664ef1facb0d9a6052270

  • SHA1

    3fd18ea2333e2812083d98966a725c9088bb8866

  • SHA256

    ecd54400db0369c93e5d31946132cd3cb4e291bc58fac9b59ea86f11e028ba61

  • SHA512

    2fc796437296d8b613085d38d38814d11ab8ea83887d9ed8b28817cec2ded3d788da27b3b2af1a56327e61bf29dc1dec9f6988f5c85e5e879f34d1e5ddbe89cc

  • SSDEEP

    3072:FgIjJ2mbKu+aDbI3Np1KeyDJ2TFxG3sY75hsyBgc+2o:FgIjJU6yNp+4FscYH/BXo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\613f632a951664ef1facb0d9a6052270_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\613f632a951664ef1facb0d9a6052270_JaffaCakes118.exe"
      1⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Windows\IS158935.EXE
        "C:\Windows\IS158935.EXE"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Windows\system32\qoMcbbCu.dll,a
          3⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          PID:2544
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Windows\IS158935.EXE"
          3⤵
            PID:2164
        • C:\Windows\MSCORELIB.EXE
          "C:\Windows\MSCORELIB.EXE"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3624

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\removalfile.bat

              Filesize

              43B

              MD5

              9a7ef09167a6f4433681b94351509043

              SHA1

              259b1375ed8e84943ca1d42646bb416325c89e12

              SHA256

              d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7

              SHA512

              96b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df

            • C:\Windows\IS158935.EXE

              Filesize

              33KB

              MD5

              58a587cae350db3f19dfa0655b35dad4

              SHA1

              688c306188754a3c5551d6fb8bba314c2075a812

              SHA256

              750fa176b57dd2b94f4a58fa9fd0efbc2fa684b43415e6875211fb6fd0d79225

              SHA512

              8a9e3166798a69b935ad9a5b91e50842accd2effd838ddd2b028b05d29b335a15d949406c4555011b05c6fdd8035366fe353c0505865cfba78a41a3757afb528

            • C:\Windows\MSCORELIB.EXE

              Filesize

              188KB

              MD5

              c419b3375ebe2f0933d18e041b81d53a

              SHA1

              9895c5dc2cf40850f1184a771a5eb39aa31d9e88

              SHA256

              c7ef3e78d362dbdfaa47d929095cbb9b6a013662bf96521178841d611501ef2e

              SHA512

              c601ba43aa66edccf0cd38bff2c8005b1a1935b45ee4b7b6f20ccf415910d8539dba22dd49266fc5624373ec018a14f59ebfc1dbdfd5cdecac7b1335c16f2dac

            • C:\Windows\SysWOW64\hgGxWmll.dll

              Filesize

              25KB

              MD5

              df933ba630cb75b186ddaf5aacfc5a11

              SHA1

              bba7e697141d6b841d7cbe29508ed691b6779c8b

              SHA256

              232488bd011328ddfcb5d131d64ed14832aebf8a8bb853496995efc34df5a0f4

              SHA512

              fc3767f74bd4d9290518c8a30f41dc40f0bc88757702b3a685fac5dc637cb27328416b89e496e175e35e5aac3d999c613aba7e19e673326ec80b764d5108ecfa

            • memory/2544-55-0x0000000010000000-0x0000000010019000-memory.dmp

              Filesize

              100KB

            • memory/2544-57-0x0000000010000000-0x0000000010019000-memory.dmp

              Filesize

              100KB

            • memory/2576-27-0x0000000002A80000-0x0000000002A85000-memory.dmp

              Filesize

              20KB

            • memory/2576-29-0x0000000010010000-0x0000000010012000-memory.dmp

              Filesize

              8KB

            • memory/2576-45-0x0000000010000000-0x0000000010019000-memory.dmp

              Filesize

              100KB

            • memory/2576-30-0x0000000010000000-0x0000000010019000-memory.dmp

              Filesize

              100KB

            • memory/2576-34-0x0000000010010000-0x0000000010012000-memory.dmp

              Filesize

              8KB

            • memory/2576-19-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/2576-16-0x00000000004A0000-0x00000000004A7000-memory.dmp

              Filesize

              28KB

            • memory/2576-49-0x0000000002A80000-0x0000000002A85000-memory.dmp

              Filesize

              20KB

            • memory/2576-46-0x00000000004A0000-0x00000000004A7000-memory.dmp

              Filesize

              28KB

            • memory/3208-21-0x0000000001000000-0x0000000001043000-memory.dmp

              Filesize

              268KB

            • memory/3624-28-0x00007FF9C65B5000-0x00007FF9C65B6000-memory.dmp

              Filesize

              4KB

            • memory/3624-42-0x000000001C720000-0x000000001C76C000-memory.dmp

              Filesize

              304KB

            • memory/3624-41-0x0000000001460000-0x0000000001468000-memory.dmp

              Filesize

              32KB

            • memory/3624-40-0x000000001C5C0000-0x000000001C65C000-memory.dmp

              Filesize

              624KB

            • memory/3624-39-0x000000001BFF0000-0x000000001C4BE000-memory.dmp

              Filesize

              4.8MB

            • memory/3624-38-0x000000001BA00000-0x000000001BAA6000-memory.dmp

              Filesize

              664KB

            • memory/3624-32-0x0000000000BF0000-0x0000000000C00000-memory.dmp

              Filesize

              64KB

            • memory/3624-33-0x00007FF9C65B5000-0x00007FF9C65B6000-memory.dmp

              Filesize

              4KB