Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 00:22

General

  • Target

    8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe

  • Size

    412KB

  • MD5

    8c959ce0c4d5f14751bf85bfd81b214b

  • SHA1

    61bd188d4c4fbad361e209c9ce107a710035b6c5

  • SHA256

    8894e0f387acf167b269af0578698d00887f26ed11eb4a17d818b5a03b01bdb7

  • SHA512

    5d3983ddaf84eed401d6b2bb075e1b32ecaec93664681747b62621bc4bdeb9640e39d176d3a4c67374988f661d49e7bd3de443d75eca9a05deafed4bdbf4c47b

  • SSDEEP

    6144:mrlZ/xSAeSIehcDTfWWA1YkJdro64g56u5BIeu5woseBn0hqFL1BDc:a/A9SIeqT+W6E63MiIeIRqhuL1BD

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:652
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1360
        • C:\Users\Admin\AppData\Roaming\lsass.exe
          /d C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Users\Admin\AppData\Roaming\lsass.exe
            /d C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Users\Admin\AppData\Roaming\lsass.exe
              /d C:\Users\Admin\AppData\Local\Temp\8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
              6⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\lsass.exe

    Filesize

    412KB

    MD5

    96e28176efe3d9f1b7acb94ff71abd73

    SHA1

    a42272c59a6a56490301356ab3f4aea4a4cbe09d

    SHA256

    fc76f086aadf8d9df5ab2f8bb875c9036d71f8efe6b4fcbb555b6e023f998e79

    SHA512

    a05d7ebd4e026d41f4c67d288b9efabf6424e571973e95af146d763a7ef0761457f211b513ca478e7c8499092b66b3ba3867d34cde3c51a96d9fd585533defe7

  • memory/652-24-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/652-7-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/652-9-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1020-31-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1020-38-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1604-14-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1604-4-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1604-2-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4272-40-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4272-42-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4272-45-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4272-48-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4272-51-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB