Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 14:37

General

  • Target

    78816ac27a0dff2f3eadec1458c74407_JaffaCakes118.exe

  • Size

    564KB

  • MD5

    78816ac27a0dff2f3eadec1458c74407

  • SHA1

    5953b3db33f79f88180b04a675034bedd5c2a5d7

  • SHA256

    0ce2fe6dc70c50750da09bff6c4293485b56f1b338d9827d80a24a927e10d460

  • SHA512

    691aa4ed3277261b19a94afd136f110fa82bfa0bf0f786765f6c6550fc3966aaba72ca13d13e7ceda30305ddc1460510219408fbbaf9732e6c948ea84b43c264

  • SSDEEP

    12288:vKr3QboC9qLGKgZKe4HYpHvcbTmddEWiS:vQ3QbiGL8LwHQWiS

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 29 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78816ac27a0dff2f3eadec1458c74407_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78816ac27a0dff2f3eadec1458c74407_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\pniqiphbzxs.exe
      "C:\Users\Admin\AppData\Local\Temp\pniqiphbzxs.exe" "c:\users\admin\appdata\local\temp\78816ac27a0dff2f3eadec1458c74407_jaffacakes118.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4584
      • C:\Users\Admin\AppData\Local\Temp\ejnnp.exe
        "C:\Users\Admin\AppData\Local\Temp\ejnnp.exe" "-C:\Users\Admin\AppData\Local\Temp\brgrevkctiybbolx.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:1612
      • C:\Users\Admin\AppData\Local\Temp\ejnnp.exe
        "C:\Users\Admin\AppData\Local\Temp\ejnnp.exe" "-C:\Users\Admin\AppData\Local\Temp\brgrevkctiybbolx.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:3488
    • C:\Users\Admin\AppData\Local\Temp\pniqiphbzxs.exe
      "C:\Users\Admin\AppData\Local\Temp\pniqiphbzxs.exe" "c:\users\admin\appdata\local\temp\78816ac27a0dff2f3eadec1458c74407_jaffacakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    1ad704ece371d682d864703045293b54

    SHA1

    2e726446b6be56a8acd8ab0804089fef18a0be8b

    SHA256

    f7468639b442ca0772fb244a1b10f02c90f0a1062a7c425bfd053a4946a04a0a

    SHA512

    d1b1d9231d7b273e4f15be2332925bcc8282a524356ab67280012e1e1c7fdb5256ff973d686b3f84f4c4a051b0e01f318eea3ea49678cc1806bbb90dd23f2e0a

  • C:\Program Files (x86)\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    c0b4a6bf8ef79a4f02dbcb2b947a93c8

    SHA1

    d3bfb3fe96502daf1e0733778cdb01fe6edfa2ef

    SHA256

    4224f1f887219cb92f54cfb0b44868c6233c8b7ec3e02a1d66fd4e57d8b95f0a

    SHA512

    23d2fac33ca93e0d03a6930df00aeb29094b309155c3a5d0e1dfe2a6a2375720a950d0e6d0cd3137aee7a4942558dfcc1f26d239de0ebac44f39052861f419d0

  • C:\Program Files (x86)\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    5696691f6bc6e1f223535092a2bf220c

    SHA1

    d2c82313fd50bff300feed37934e31e24f1ba734

    SHA256

    8dcf15b1c266295c03fc8488451c628245b5783d734390705a828f6b560cef63

    SHA512

    e92b374c7aad224fe91fef052a7952adca84316060917c6109866c584304099ef984c4d9b6314a3f41f74a36431d30e3b9e998742c37381492ea06f775477f14

  • C:\Program Files (x86)\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    e0da04d454b72403edff9a8909256c8c

    SHA1

    f0857f74dc504c09eda0fed0a9af9e13a7fb35c3

    SHA256

    82014bded90f05dc9dcad465db70ef1d40217d1b1d88505f6c0ce53ef4e01c0e

    SHA512

    d17eae24403bd7c9119938f8a05a344de471d2916f656182f398b98eb9b932fe71403404e47c3c499d63d777e20d3fcecda6cfd486e13718985929aa65a98b4b

  • C:\Program Files (x86)\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    eb2508e8f325992a827cf317e43b0a5a

    SHA1

    579ea75a5aa70af29afeb6886320426974ec0deb

    SHA256

    27fa8669c5bf87be4637198afce5f39daf13668af0876a3ce890051ca77d3a87

    SHA512

    4bb8caa0ba7efb306976a67ed942f39b881dfffff3cc3aea73bf8f56ae976022dcb32d9a4834fbe11e6c32e5b244a00e2a7735388ae9483f983bcda1630a47de

  • C:\Program Files (x86)\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    fd55719511c910d5151aeab7bccf063b

    SHA1

    0b82a266415a2745aaea413db34e35afb370f479

    SHA256

    c6fa6086310b6249d1b7d9991ca98dbf3ef53d51951760c5fcc179cf3fd600f8

    SHA512

    3d1719a2c68dbf14e1bc3d311a3ed9eb32d1ec98ad76894515d2fa6ceac9d01b357c03b0e62b601543f21748640cab5a5797633b1cc700270a1ed0b2f5dc46ad

  • C:\Users\Admin\AppData\Local\Temp\ejnnp.exe

    Filesize

    712KB

    MD5

    e9e538d8db272f48107ae764894a461e

    SHA1

    51341d1f87fb6967f55f2215e77c797915ac5655

    SHA256

    6a7c75b9909107a5bc16a5864e14b95109530162d0ecd32f0901752eb0eca52d

    SHA512

    5eaa7567cfba2da3e76b087cb0ce816f5fc232d5f561ac7bcdacb8affe2382528dd371f4091e1a77dead5060fd619ab0f42f037886e0a8b33fb5077a223bdc28

  • C:\Users\Admin\AppData\Local\Temp\pniqiphbzxs.exe

    Filesize

    320KB

    MD5

    08b16e4ac8ad754742cc30981da0eff3

    SHA1

    50dc22991a43f311028db1f5a17fc58f67572af0

    SHA256

    06e8fcb18084b90fc51132a00763162a53458fd980dae82dd304ba6ee1d3c954

    SHA512

    8eac805e0da0808d9d42addbc8471995a4d0514735f58ed5ded1a389750e19073309f6f0d4349085b2e46fedc30462b6571de05b8221d91ec0262d54ca386722

  • C:\Users\Admin\AppData\Local\ffezwxwyzyylvszvclffez.xwy

    Filesize

    280B

    MD5

    7de99e170c910e46d2c89c94dce298c9

    SHA1

    19306d1bdb4b145945a07a7420f1940e0c30f609

    SHA256

    eb2cd17cc25e948f5f30207f20fa1d032996acbca86b5bd29bf2068384a68778

    SHA512

    2d838c67b08d5cdcde7a6c7f28b8175d73d29931f96a71a6f2f96916eb6bba7e79e23b1096b04d5188682193a7450e74fc0cf542a6d498cb4ae34c03a05c06ca

  • C:\Users\Admin\AppData\Local\whrxfrboakvtowovnhmxhnvhreqaljeme.dxc

    Filesize

    4KB

    MD5

    f3091f533a3ec4db479f1d17d0666697

    SHA1

    30e5b7919acc28780b9ce0180e1b72dd49961a76

    SHA256

    dc5ba63ef876dae12793a714715612f1c9cf016de54ffd9ccf4693e151cf6571

    SHA512

    b2885b3865909a46105b4a7b8aaad5f9b2ec35e28e7975ccf530e9fd7dc429b93944531238c17133a75acb9c1335d0e6b4e6f7e86e946215b476b65c07b3336f

  • C:\Windows\SysWOW64\rjancvmgzqinpedrqr.exe

    Filesize

    564KB

    MD5

    78816ac27a0dff2f3eadec1458c74407

    SHA1

    5953b3db33f79f88180b04a675034bedd5c2a5d7

    SHA256

    0ce2fe6dc70c50750da09bff6c4293485b56f1b338d9827d80a24a927e10d460

    SHA512

    691aa4ed3277261b19a94afd136f110fa82bfa0bf0f786765f6c6550fc3966aaba72ca13d13e7ceda30305ddc1460510219408fbbaf9732e6c948ea84b43c264