Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 20:10

General

  • Target

    710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe

  • Size

    764KB

  • MD5

    710c4174e50f8f983c87c11a6b0d98bd

  • SHA1

    cb41313bf0d4c6a8333165522d0fb197f9a913ba

  • SHA256

    c126878ed92b76bba1a472ed31665c6825a4359f478b69981409a785da15d07c

  • SHA512

    32156b679f84d088f06cca6e8ac285599c4dd744c4a04573d1994af11c8b5498f117541317317104cb3338b5fed9647305f29e4b8bfb8fd5c84b392d35ac1c36

  • SSDEEP

    12288:pOVC0kxf99BYwgkf1Y6ai6yWgXZ9Rlmy6qwEh1B4isFCK3x4QHpZGd8d87:sCpR99SwBYa6YHl6LrtFCgCQud8dM

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Users\Admin\AppData\Local\Temp\JB7DCAE1.exe
        C:\Users\Admin\AppData\Local\Temp\JB7DCAE1.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4156
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2420
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1820
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\systems.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\systems.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4080
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\systems.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\systems.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5868.~cx

    Filesize

    3KB

    MD5

    91e958f88331094ceb1b5ef1b3d88912

    SHA1

    e4ba253033f5d3065646c0a042e3f2cb26f8dc19

    SHA256

    b5ff54a50a2fa8ec788d2586a0387908743bfb913ba65265ee06176252bce1b1

    SHA512

    c54fb92a627c54ebf606af464ca564a9e5e1f2762ef5f480d3f0ce315c8c5b2b25afc2c9cf3467d731499c9b8879f5d6149d563d9a0ab9723c21b6faf33a4f66

  • C:\Users\Admin\AppData\Local\Temp\JB7DCAE1.exe

    Filesize

    240KB

    MD5

    7120aabfa4282effabda10341456e4e1

    SHA1

    bff462f12458402494bb639f882c3411d9a3e6d4

    SHA256

    c1715b591ed08adae649bc97a06dc74acc2d99091f46657981ab33755dc95b25

    SHA512

    601d578b7096b6276fe724729b8edfc26752f5c5862941a63c85f064f5cc1ae16941d7d9814e117b4ed6d728d91c874d25647655412ae18bbec20b306b3d8015

  • memory/2772-94-0x0000000000400000-0x0000000000836000-memory.dmp

    Filesize

    4.2MB

  • memory/2772-87-0x0000000000400000-0x0000000000836000-memory.dmp

    Filesize

    4.2MB

  • memory/3756-97-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-110-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-91-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-92-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-0-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-95-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-90-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-100-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-96-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-106-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-115-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-119-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-123-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/3756-141-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB