Analysis

  • max time kernel
    148s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 14:01

General

  • Target

    6373c5ce6b23e9b40c8f5c35620160f3_JaffaCakes118.exe

  • Size

    368KB

  • MD5

    6373c5ce6b23e9b40c8f5c35620160f3

  • SHA1

    51fc3d32046dfb1b57a916503b6f80e1c688fb11

  • SHA256

    0a61f36de086ca2f117ede62133917d5889d7c4b0642ee234bcdbe621b934c27

  • SHA512

    f35361d048af77bfad13766a8af1e1351d183ebb555c94c0c97ef4b0c175fbba4bc51493ced994516f071559cf0ebefa02a1b0f1f5189e2c880e2ddf52ffcfa6

  • SSDEEP

    6144:/s2W1fP41l3uWBpaMU/sEOSdFoWby3/XwpbCSRk/SIpybzcdMxiElUY:/nAP4b3hBpahoKFotIpbli61i+

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6373c5ce6b23e9b40c8f5c35620160f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6373c5ce6b23e9b40c8f5c35620160f3_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\kbdhebl3B.exe
      C:\Windows\SysWOW64\kbdhebl3B.exe
      2⤵
      • Drops file in Drivers directory
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\system32\ipconfig.exe" /flushdns
        3⤵
        • Gathers network information
        PID:2892
    • C:\Windows\SysWOW64\cmd.exe
      /c C:\Users\Admin\AppData\Local\Temp\~unins8671.bat "C:\Users\Admin\AppData\Local\Temp\6373c5ce6b23e9b40c8f5c35620160f3_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~unins8671.bat

    Filesize

    49B

    MD5

    9e0a2f5ab30517809b95a1ff1dd98c53

    SHA1

    5c1eefdf10e67d1e9216e2e3f5e92352d583c9ce

    SHA256

    97ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32

    SHA512

    e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42

  • C:\Users\Adminxplore.exe

    Filesize

    89B

    MD5

    2bd83f0dd1740fff26d071dcdd59af56

    SHA1

    221e9e64a79255053a9e4da65957a7bdd6bc045b

    SHA256

    70a676e21716581858de2753ea5eec8befe6741ed299216f65a13c3853805c05

    SHA512

    fe632b63b8b850cc83f0eb2a114de60693ec0dd8b62fe8f0938b42526557889f48357da0ca3bb06bed1ad68562280023a69b54d93cff8b7266bb8ebb63ac903c

  • C:\Windows\SysWOW64\kbdhebl3B.exe

    Filesize

    131KB

    MD5

    bea813e98c89be6f403b3229849c1200

    SHA1

    3b8a39f228cfd17948f3501765348f9cd0d5f6a0

    SHA256

    31372318ad269b8e5b8682ba08a87c069eb759f0938d3f1e280f989729b63f9c

    SHA512

    57a8d9249c3caf2f70f9bf626ad9e5a9d9e7014382ad9890d1996dc1c5e464d26cd4276299187ae2cab88ac1dc42e64cd2eaf9e83af09d6ef913869fd58a04cb

  • memory/2408-0-0x0000000000413000-0x00000000004A6000-memory.dmp

    Filesize

    588KB

  • memory/2408-1-0x0000000002220000-0x00000000022B5000-memory.dmp

    Filesize

    596KB

  • memory/2408-5-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB

  • memory/2408-26-0x0000000000413000-0x00000000004A6000-memory.dmp

    Filesize

    588KB