Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 22:51

General

  • Target

    ace7b17fde1bbc4793699ce122536a1c_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    ace7b17fde1bbc4793699ce122536a1c

  • SHA1

    4ad092beef72e98a759e3c2cca6b63afff644afb

  • SHA256

    c4dd9a6b5b0dd93906e7336b1a9a1f3a2e437080fa184a944bcd1071c54d6e28

  • SHA512

    d2f615cb0d5cfeb76da0128a6c7600f699824187a7375bad4610db163879b058c2ddbd778c5f2466cff19358318303553061f9c10288d7c9e5856a1533ab6e99

  • SSDEEP

    24576:eKfcBFJHSok2vRYiwrf+G2Cq7iJy26QwFdZJLBEUjZDo:eNXgKu7Py2IFdHLSUjq

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ace7b17fde1bbc4793699ce122536a1c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ace7b17fde1bbc4793699ce122536a1c_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\983PAC~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\983PAC~1.EXE
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XRHOST~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XRHOST~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\983PAC~1.EXE

    Filesize

    572KB

    MD5

    faf56ac537610cd6b4b494b4e61c3f31

    SHA1

    43059a670721137b7de4731e6657b1cfef632fef

    SHA256

    036c91fea0b2284bb16322a33006645b5f6e67a72225f18ed1aa7eba4f2ba265

    SHA512

    20877f964b4d8224a5870824c6e1b8d35e5423384ed136077d9321f34bfe71f88d81977f4120391838dc2b3999c4733a10d4e927a2f606b105cbc10ddc9edab0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSCOMCTL.OCX

    Filesize

    514KB

    MD5

    4a40bb8e7e658c766241978bc5412097

    SHA1

    3ae83d20749f796d2934c2c6f4cbbb3cd595749b

    SHA256

    3a1e1b50bc63f803d891f2dd8da32d87b7552c344bdabc17506c9f4b8163ae6e

    SHA512

    5ae6f6caeb6c7e49ce7fc3b3192cd158364fbe00b7d19fb6bae5ee16d0decae98722ad5d7fd5f4b183a55020206027ba09e376e6af4cd52ea3f0d891b27890eb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSWINSCK.OCX

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XRHOST~1.EXE

    Filesize

    188KB

    MD5

    4bf978d87341d9b87aac82e3add08a1b

    SHA1

    eeacdb767c566ea0065d27c8da8ad820d40a2b1d

    SHA256

    a283b0bc66d85470ec0a9a55005674bc0d0919d7c962247694a1000e041655a2

    SHA512

    bf43746423632590ccf6c182b41337991cec9846b7fc0a28b5198c2c2c404196fdcc9f83bb2dcc4d1409be4210e7be759c15f0ffd9649fbc1aa121d088d9ee2b

  • memory/1584-8-0x0000000001000000-0x0000000001249000-memory.dmp

    Filesize

    2.3MB

  • memory/1584-11-0x0000000000160000-0x00000000001AD000-memory.dmp

    Filesize

    308KB

  • memory/1584-10-0x0000000001000000-0x0000000001249000-memory.dmp

    Filesize

    2.3MB

  • memory/1584-9-0x0000000001000000-0x0000000001249000-memory.dmp

    Filesize

    2.3MB

  • memory/1584-7-0x0000000001000000-0x0000000001249000-memory.dmp

    Filesize

    2.3MB

  • memory/1584-2-0x0000000000160000-0x00000000001AD000-memory.dmp

    Filesize

    308KB

  • memory/1584-27-0x0000000000160000-0x00000000001AD000-memory.dmp

    Filesize

    308KB

  • memory/1584-35-0x0000000001000000-0x0000000001249000-memory.dmp

    Filesize

    2.3MB

  • memory/1584-0-0x0000000001000000-0x0000000001249000-memory.dmp

    Filesize

    2.3MB

  • memory/3740-38-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/3740-40-0x00000000005E0000-0x000000000062D000-memory.dmp

    Filesize

    308KB

  • memory/3740-39-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/3740-42-0x000000000040B000-0x000000000040E000-memory.dmp

    Filesize

    12KB

  • memory/3740-49-0x00000000005E0000-0x000000000062D000-memory.dmp

    Filesize

    308KB

  • memory/3740-50-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/3740-54-0x00000000005E0000-0x000000000062D000-memory.dmp

    Filesize

    308KB

  • memory/3740-29-0x00000000005E0000-0x000000000062D000-memory.dmp

    Filesize

    308KB

  • memory/3740-56-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/3740-26-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/4732-64-0x0000000027580000-0x00000000276B5000-memory.dmp

    Filesize

    1.2MB

  • memory/4732-66-0x0000000027580000-0x00000000276B5000-memory.dmp

    Filesize

    1.2MB

  • memory/4732-69-0x0000000027580000-0x00000000276B5000-memory.dmp

    Filesize

    1.2MB