Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 04:06

General

  • Target

    a551c748c194a54a1aaccef54c2827f9_JaffaCakes118.exe

  • Size

    11KB

  • MD5

    a551c748c194a54a1aaccef54c2827f9

  • SHA1

    fd2621a438bac3e1b020956c15625f8eac3fb2b0

  • SHA256

    0953b0a89d591cb2506c5234b11081cddd1097484ba08ae9a95a48bcf581a2e9

  • SHA512

    bac9ca704cac083c842d0d8956759283d4c02f2f08980ef27a1c9e7a437ca9e9b4a279e64b49dd7ef3e44080f39f183fe7e37d92e9f49872cf753b8850896933

  • SSDEEP

    192:pauKHU3qWAtzGYQfy+F3S582xwDin+fZxps3dgvfZHDTbKNNFv1AJKmVJNbXCSEa:pn2U3Gt6lq+082YTZxp5ytiKmXkERaY

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a551c748c194a54a1aaccef54c2827f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a551c748c194a54a1aaccef54c2827f9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\SysWOW64\isnotify.exe
      C:\Windows\system32\isnotify.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5100
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A551C7~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\isnotify.exe

    Filesize

    8KB

    MD5

    d92dbe512681ff7469e923738bf26281

    SHA1

    aa171b30f00c972c56501d11a2426ab52fd24c31

    SHA256

    e4ba76ebeb58947630815de3b323bd44358e2734aa2aa7215fc02be9aae5f2a4

    SHA512

    83c33442004e9dfbd395e2edadd0b32aa589eaae390da6e353626319fde77835b61d6586af44f2383f766f8087c6395171c9d2d0808c587b83a59209addaa18a