Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 07:30

General

  • Target

    8545d00334e198ef9e858586c45b78c1_JaffaCakes118.exe

  • Size

    71KB

  • MD5

    8545d00334e198ef9e858586c45b78c1

  • SHA1

    ad7846039de0163ef3bbaccf8e22bd506f8ff2cc

  • SHA256

    a41422a859b3cdbc59032046a034973274e0ad26d6eda7e23bae790f88e3f7d4

  • SHA512

    989fa41d82fcfa051588f7244470e06c14203b21e75494d06ca635ab596896431431afd9ee633d0dc3b26ad4b7dbad451d2894eddc0b40824e7a2cfabe8f3ce5

  • SSDEEP

    1536:+XcS+oXb+AcjJ3wN/g5hcxiqNGZSsBIGOP6vzgCNUoxHww:icS+oLwjNMg5yxiqI4UIGOP6v0CNUKHR

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 3 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8545d00334e198ef9e858586c45b78c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8545d00334e198ef9e858586c45b78c1_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Windows\SysWOW64\attrib.exe
      attrib +s +h "C:\Windows\system\zhahss081216.exe"
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Views/modifies file attributes
      PID:3020
    • C:\Windows\SysWOW64\attrib.exe
      attrib +s +h "C:\Windows\system\zhnahsdf081216c.dll"
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Views/modifies file attributes
      PID:368
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Windows\system\zhnahsdf081216c.dll a16zhqb
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "c:\zhqbdf16d.bat"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Windows\system\zhahss081216.exe
          "C:\Windows\system\zhahss081216.exe" i
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h "C:\Windows\system\nbhsyh32b.dll"
            5⤵
            • Sets file to hidden
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:1888
          • C:\program files\internet explorer\iexplore.exe
            "C:\program files\internet explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:17410 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4480
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\8545d00334e198ef9e858586c45b78c1_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Documents and Settings\All Users\hsyhdf16.ini

          Filesize

          149B

          MD5

          ad893bb2f87189236cfb1e166f348ba1

          SHA1

          4951cc77f27c7e9269a3b7527d1c13c57b74e275

          SHA256

          7196a0b3e5c8449da210301c1ef10c2b4ec6306cc1d1fa298fec25cc0261d257

          SHA512

          3f0345f142f2d2d1bc0d730df3911bdbe8905582b0e0749e36a09203dbcc0de4dadcdb64088b7a35ff9943fcaf7a4935463977f2097277a042347e72c574a3c2

        • C:\Documents and Settings\All Users\hsyhdf16.ini

          Filesize

          184B

          MD5

          9433bacd59e395f4241c26ccb16c19cf

          SHA1

          1bf0fccb6b283460988a3953a495854a1ae74d4d

          SHA256

          f4a7f97d492d7afa06d654585db4222f02ce9ab98679e205472e3cb64a945b77

          SHA512

          b4184c1a6d5e22df625ca97f04e947b26ca2a40eaebfa9c4103abf8cfe0450873ab2c8855db2da58f832b506a0907eb3af702b1bcb68a09d57c3d50fe2205f80

        • C:\Documents and Settings\All Users\hsyhdf16.ini

          Filesize

          224B

          MD5

          c48fc4da29b985047014d874dd3fa195

          SHA1

          55cd1e0bcfd073253cd662f48636b1a5197457b2

          SHA256

          2f05e9621c327bdf10660d6cbfc0915c740fa577a7d66a8161082fd27890267e

          SHA512

          067b31ac04fae01e765b0c6c87f9070c2f27c7c9724aae9a7eaf3365e0e3e432bfefff63ff59d04e7159f79bb6376a5e6736225436fa03f0b64a7e45fc2a84ed

        • C:\ProgramData\hsyhdf16.ini

          Filesize

          97B

          MD5

          cbdb3cafd9b0da2a8b4a5b1a7649f014

          SHA1

          3a5a512dba8f2a3a8224f2172318f6b7ce18ff50

          SHA256

          b48f6739d26fa95055fa128bc316629a7285c9f610b4bdf8e0d3cc5b8897b789

          SHA512

          a92fb4ed636eef7a3a8471bbcfcb256a0a9c0530fbad1d1be190edfa055fa4c5d41ee29d333075f658e6f14bb74a3bd7ab74e85a6be7ba3453b7b628d2308025

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver2C6A.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Windows\System\zhnahsdf081216c.dll

          Filesize

          28KB

          MD5

          feeda2bf6726950a2c7b935f1f715bd2

          SHA1

          c9ad17c561c44d0bcb07b8782cd2ab9951d74ab3

          SHA256

          39ed600dcd9e5bf438bd1b90626bdc978a5d78afa3e567107ae7750ea4bb0532

          SHA512

          e6e0b2cfa0649f71095eea9f7cb939c4b8535fc1d5c9693d4c167164d60393a4cc9eeb753c828fc8571ecf40a7021f4c8b5326f9eb36dae5866bc6f27f49c92f

        • C:\Windows\system\nbhsyh32b.dll

          Filesize

          118KB

          MD5

          ad353f16bb0abfea48b218d52eed7821

          SHA1

          13244905005719c593711aff82fbffcbdff46704

          SHA256

          806248101f49de3a1fbd58c9475f7ce0227b9ec286d9f738e6f7975cfcc2004c

          SHA512

          1afbbfb8df4230bbdda15f2e7689cc4b839e02b5ac11418299be96400a156ac6965c8c8602eea912deea3a8ba9b7d450b2c31bb7696e336c72bd25f32568f8f3

        • C:\Windows\system\zhahss081216.exe

          Filesize

          71KB

          MD5

          8545d00334e198ef9e858586c45b78c1

          SHA1

          ad7846039de0163ef3bbaccf8e22bd506f8ff2cc

          SHA256

          a41422a859b3cdbc59032046a034973274e0ad26d6eda7e23bae790f88e3f7d4

          SHA512

          989fa41d82fcfa051588f7244470e06c14203b21e75494d06ca635ab596896431431afd9ee633d0dc3b26ad4b7dbad451d2894eddc0b40824e7a2cfabe8f3ce5

        • \??\c:\zhqbdf16d.bat

          Filesize

          48B

          MD5

          f9b63340821732540490fd995249cce1

          SHA1

          4bb6fdca753ef7dd14d6ca9aec09d0338bc4f24b

          SHA256

          c61895d622f8a6a0fc5faaeb3e70e06dda4750773576071f658cdf8048d8f308

          SHA512

          fe0b63c2ae8174696207d9b121f1eebf5543999dc489c7b93d8e571f6db7a7d3b1c7c604551590991124802bd69f4d725413082aa546b1359e7baeae915ed739

        • memory/2972-34-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2972-48-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2972-64-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2972-65-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB