Analysis

  • max time kernel
    141s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 13:29

General

  • Target

    863c64c3f763e2932850cbe120ca5c6f_JaffaCakes118.exe

  • Size

    493KB

  • MD5

    863c64c3f763e2932850cbe120ca5c6f

  • SHA1

    9f9af14230033e14d5ce95316b2e9870e68b8ac1

  • SHA256

    9aaa7c6bb1170352bb74fbd9de4ac553e4fcb1b51c4e89bee3853910a2ae1e6e

  • SHA512

    35f262e62bc31fd716cda68003f6c6497b469116419c0e036601b1b5c3922aff7b7f7223e0c135294cb3c85f88c7f8241319916accd347422cac3059573db9e8

  • SSDEEP

    12288:PaYWPh1az3BxVSQUmK7ruwAk3Ns+bIMrtl:2ZI3lSpmgrzAAs+bIMrt

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\863c64c3f763e2932850cbe120ca5c6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\863c64c3f763e2932850cbe120ca5c6f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Program Files (x86)\AdvTopC\AdvTCApp.exe
      "C:\Program Files (x86)\AdvTopC\AdvTCApp.exe" /r
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4056
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\AdvTopC\TCHelper.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3536
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=1436 /prefetch:8
    1⤵
      PID:1444

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\AdvTopC\AdvTCApp.exe

            Filesize

            305KB

            MD5

            6c4fb5bdff7ea9f5807571c6ee872170

            SHA1

            9fb2226edb06b4c99743a2f7070d28d7b01e7a8f

            SHA256

            867b016b5bd895a8149d76b0c5d4a55a20e2aa38b0bd24a134e769ca96d9d918

            SHA512

            54aaae9cb34615fd16f64572dd8c4ff44222ca8d8a07b8e089ccd8f5bee7a57eeca0a5e95908bfd5dd5a42e401c7e9e88f98ead2c3d8653571fe165fb25612ed

          • C:\Program Files (x86)\AdvTopC\AdvTCApp.tlb

            Filesize

            2KB

            MD5

            c1c8e38be148a3148ef3d993c3f454d8

            SHA1

            77bbe86132c511c50a9b3b88ea7bc471e7d7e69f

            SHA256

            7285e819ccaacecc882f91138e5402d80ac32927216c8e40030f6b60232613ba

            SHA512

            68e5e2e08330bcb44a45a6e76fd98ed0678deaf19b897cb35f47431ace4ea454745af9a6e8fea91dec4f1289f02cda2589a2aba70df809868158a391e2ca0dfe

          • C:\Program Files (x86)\AdvTopC\TCHelper.dll

            Filesize

            230KB

            MD5

            1ff579e3d5ed93a9a90ee3548f575356

            SHA1

            9bcb2e209a962bd2e93069ad49289c0d33cd05bd

            SHA256

            03614623326db9c1575c9484128182a925a718e9a5ffca8d1678c5100e638a52

            SHA512

            1da3de2054b6555fc928aab07eacdc0686058484b813716e32a8b7c1d89a00709e3942be00d0c640587e49bbc21eddb50b2e7835af9fdd38b50d8690e173716c