Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 06:26

General

  • Target

    72ec8925b8a71e8756bc25941cdbc85a_JaffaCakes118.exe

  • Size

    267KB

  • MD5

    72ec8925b8a71e8756bc25941cdbc85a

  • SHA1

    c576ac60b3166e57c7782d8f808ddb86279a2892

  • SHA256

    c6ce4fdd22b4053a72356d044b39752f1534b1f5459863dbbcd2c94157bdc5a8

  • SHA512

    8515e2b70b31a84927384ff18277248ad0bb80f33091feaaf6706777233e6638cde41b80af8254be4628248a52b90fab3c0887725c7041e12a1911ad9142a433

  • SSDEEP

    6144:TO//AV7U++3nY7AlWgn/b95lR9g1UHsk4:a/IVcI70z9HR9XsZ

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 7 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72ec8925b8a71e8756bc25941cdbc85a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\72ec8925b8a71e8756bc25941cdbc85a_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Program Files\Common Files\Microsoft Shared\A_v_DVD.dll
      "C:\Program Files\Common Files\Microsoft Shared\A_v_DVD.dll"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\new_ma.exe_7B280F7BA9D5F7B440C60E753A5D9A3790A16255.exe
        "C:\Users\Admin\AppData\Local\Temp\new_ma.exe_7B280F7BA9D5F7B440C60E753A5D9A3790A16255.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2420
    • C:\Program Files\Common Files\Microsoft Shared\services.exe
      "C:\Program Files\Common Files\Microsoft Shared\services.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 536
        3⤵
        • Program crash
        PID:1700
    • C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll
      "C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Program Files\Common Files\Microsoft Shared\services.exe
        "C:\Program Files\Common Files\Microsoft Shared\services.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3200
    • C:\Program Files\Common Files\Microsoft Shared\A_v_TT.dll
      "C:\Program Files\Common Files\Microsoft Shared\A_v_TT.dll"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1836
  • C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll
    "C:\Program Files\Common Files\Microsoft Shared\A_v_AuTo.dll"
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2332
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2504 -ip 2504
    1⤵
      PID:4616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\A_v_DVD.dll

      Filesize

      606KB

      MD5

      fae68a13aa38a04edf4ed964b65249c2

      SHA1

      6667235da63fc8f227888d0faff827243cfb5bd9

      SHA256

      2447d94b6185dd059bb06cd8a53fd12eaea9ba781cd4dde02da1f8e4cc1ac5b2

      SHA512

      5b86a945a2afaf7b72fd9d937662b101a8e3327331d21cd275e84ccc7ad63b55d0dbbeb71a0af05ec39dba8bf671f9e5e149ebc3de99bf03b059342bab2ef4f0

    • C:\Program Files\Common Files\microsoft shared\A_v_AuTo.dll

      Filesize

      47.7MB

      MD5

      63d250f95ec667bbcb6199006bb78074

      SHA1

      02f5f0800f782a1e6d968020de1d2f399f714641

      SHA256

      9a36b5d6236ff68360c95e511698b618692381e79c17ed23b8fdb1e03d4dbd96

      SHA512

      3c67ce605bf3c405a97cf27fefb5cf34b930fe1a57c50f0c00fd73a952e0e548677041245cb0df8e5fc8bf57e84efefd37bd6e5fa3e91c66f96f8e2715ee0644

    • C:\Program Files\Common Files\microsoft shared\A_v_TT.dll

      Filesize

      47.7MB

      MD5

      5c07c5effbec9ba56e48f729333006e0

      SHA1

      bbb1255401ba44b85b544f461e6df368a7c097b4

      SHA256

      7e469984354c504f63d68e01b05016dc6b18fd5f233edeb807d4cd6a758a24e6

      SHA512

      1084308005fd714304b4a90c1d6760b2477f242e2f49ab31807031fcebfd7deb399f88d6c6bec71e0d27788d6a6b0d929b3129c2679fc3963db97ad6410ee3b3

    • C:\Program Files\Common Files\microsoft shared\services.exe

      Filesize

      47.7MB

      MD5

      b2e593e5252cc00753a5c3b2b69f0863

      SHA1

      0f8863429e87500756490a59c21f995fd9884e70

      SHA256

      76e3874e46bab1e9e665fc7974c30a72decb7de9b0cf19076e35bcdb7c59b07e

      SHA512

      f39260ca005f629a1b5ebe103ffc6f9eb3f37131cd5b045dc7db1cf2438250499d9c303e6657504aa0b454e91bc32d1c6073a9959e4804a0f89bfe9ebdc81580

    • C:\Users\Admin\AppData\Local\Temp\new_ma.exe_7B280F7BA9D5F7B440C60E753A5D9A3790A16255.exe

      Filesize

      252KB

      MD5

      f84d7e77b87e8a4867802e2e244ab8f5

      SHA1

      b773711a957f583fd76a72933dc7554f6c842f0a

      SHA256

      4d1a70f0e30ba919572a6102328d870b19ae8c33950fee05f25b2f5ac1127aa9

      SHA512

      e3a097c10572e53751e9a7a1c7486cbeeed3c60c076a9e8ef845186ea31160779fe0dd4bc5bfd8958e84793d66ad563fdb13007887809c34171a47079da75c0d

    • memory/1836-67-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/1836-73-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/1836-66-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/2092-12-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/2092-27-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2092-11-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2092-8-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/2332-47-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2332-45-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2420-16-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2504-29-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/2504-31-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/2504-58-0x0000000000401000-0x0000000000413000-memory.dmp

      Filesize

      72KB

    • memory/2504-30-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/2504-28-0x0000000000401000-0x0000000000413000-memory.dmp

      Filesize

      72KB

    • memory/2504-25-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/2504-56-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/2956-41-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2956-49-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3200-44-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/3200-51-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/3200-50-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/3200-52-0x0000000000400000-0x0000000000420FD9-memory.dmp

      Filesize

      131KB

    • memory/3556-22-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3556-40-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3556-33-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/3556-65-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3556-0-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3556-69-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3556-1-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB