Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 19:25

General

  • Target

    a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    a7e9dd646b4bad2c5e4f622feec0262a

  • SHA1

    c820b37bdb4b7466ac7d7acb3f5e9fb7b40b1e8f

  • SHA256

    55e4c8c2853a7840f64cec0e2e90d9fcafc22320428c8d69093ff081254be20c

  • SHA512

    95138941f672c8cf09a97c8ec89ef4e64d8fb483ef1890d1e79f5334453e44df16cc426eb17c3c0ba726e3148075fd7bc40cfdcf90fc5f0cb0ababc8f74f1497

  • SSDEEP

    12288:g99MYYs/zDnn6/YBh6Wu1MXp7tJ7NDtChroRARoHrPK:gAByvnQYn6iXdZJChroGMK

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"
        3⤵
        • Checks computer location settings
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
          "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3588
          • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
            "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4492
            • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
              "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4696
              • C:\Users\Admin\AppData\Local\Temp\miner.exe
                "C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://mtred.com:8337 -u illusive101 -p slimjim101 -t 1
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2920
              • C:\Users\Admin\AppData\Local\Temp\unzip.exe
                "C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3744
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\help.bat

          Filesize

          142B

          MD5

          6a816de02813391f892ca690dbbe1ecb

          SHA1

          7ea84457eaec9babb9f458f9e8fc69ee373deb42

          SHA256

          83c7106ddcfd370130c1dd94ed0a1b770380f266a91b6bc8c34ede5fc778e32b

          SHA512

          817cb3c08f466115023148efcda7a75565f88fc6dec789a12ec51754463e56773282cc5c9ffa45b67d53c1603754651ee31bc48cede31566007ac40b98c2033c

        • C:\Users\Admin\AppData\Local\Temp\miner.exe

          Filesize

          726KB

          MD5

          3b4986e5d94d0e5723eea640a6735769

          SHA1

          eab3272d5ef1038bf3d336d2b033b813403a9ff2

          SHA256

          8b2b026f8d00b02ff75f05cbf322e4f4b85fb609cddd93bebf17014914b90df9

          SHA512

          efff68d4e82bf61cf7430e0673fe92f5f379ac5e52b084516d6d624097e3f767f7696f48d576dce02b03fe5976db862271db5a7b01298211913b5fa901ddb965

        • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

          Filesize

          496KB

          MD5

          a7e9dd646b4bad2c5e4f622feec0262a

          SHA1

          c820b37bdb4b7466ac7d7acb3f5e9fb7b40b1e8f

          SHA256

          55e4c8c2853a7840f64cec0e2e90d9fcafc22320428c8d69093ff081254be20c

          SHA512

          95138941f672c8cf09a97c8ec89ef4e64d8fb483ef1890d1e79f5334453e44df16cc426eb17c3c0ba726e3148075fd7bc40cfdcf90fc5f0cb0ababc8f74f1497

        • C:\Users\Admin\AppData\Local\Temp\unzip.exe

          Filesize

          164KB

          MD5

          75375c22c72f1beb76bea39c22a1ed68

          SHA1

          e1652b058195db3f5f754b7ab430652ae04a50b8

          SHA256

          8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

          SHA512

          1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

        • memory/3376-28-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/3376-11-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/3376-12-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/3376-9-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/3376-7-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/4048-2-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/4048-10-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/4048-4-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/4492-48-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/4492-36-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/4696-43-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/4696-45-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/4696-44-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/4696-77-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB

        • memory/4696-81-0x0000000000400000-0x00000000004FF000-memory.dmp

          Filesize

          1020KB