Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 04:55

General

  • Target

    a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe

  • Size

    398KB

  • MD5

    a9abd03899f9d0d30033a99d60d25aa3

  • SHA1

    2400a2ece5fc5b69a95f232f5bf72d23492d4923

  • SHA256

    b1d58ec9e1339af39852ad1d9af8eef47abf7e92d07bb0b86b9ead3118d0821e

  • SHA512

    41c1413be4b712008b074077d3e31cce74da613f7c7e28a21fcc62f856a5e3ee2b8078cbfe253d635ad703ef669b9c0146a4c099e96a2a33fecc41ca0323b058

  • SSDEEP

    12288:2C8j5LHNmRG4Pn8FE+Kqz/vR3FvK0mzlt:Z8FbQ/8FEcz/HKXv

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Users\Public\Downloads\Norton\{N360P_prod_1.19_4.1.0.32}\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe
      C:\Users\Public\Downloads\Norton\{N360P_prod_1.19_4.1.0.32}\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe /r
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\LC.INI

    Filesize

    157B

    MD5

    d602937f584468e6bd719c42c291da1c

    SHA1

    e475063589700bf8af8fb3ad38b30303079d01fd

    SHA256

    647cfab7711531650217f994beb337cceac175b81228df65c343bf2eb6ea9e63

    SHA512

    2dff9ba95b65d9dbff7de311dd092624bd2fb63e82a96b2d1d86001d5668265d6bf427ca17367ea5cfd013e54295613da9b94dfa691a46962e01ab591ec6a524

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-355097885-2402257403-2971294179-1000\4bd07e1ba952c6aa9bf83a8d98c08949_30dd1cc1-5c25-4745-b2f5-cffa52b1a886

    Filesize

    54B

    MD5

    9499c2f308410e48386f58ca7afccd2e

    SHA1

    e2ef9dec757aec938d801dd720fddc0c387da7af

    SHA256

    87e4fc1f82d5a89c7f10ca58cf5de66d184cc3ce02954a13ade3100414a3bc97

    SHA512

    ff68637e2b3b62cf6ca812bf4d067606edacb353825628048396c45e9be8ca7725c93787b8bcf82e610cf795f69a52b20d4ac48ade5405b114643af6515cf457

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Norton\Norton Installation Files.lnk

    Filesize

    1KB

    MD5

    f1395fcafd9fb0eff53cef85aebce978

    SHA1

    06815b4c56eba39902bb7a8814a52c8b58a34e9d

    SHA256

    d3a080376a031310797a36626dcfbfb89bdceeacae3beb64b9d6dbf6c47a5433

    SHA512

    5092be15c9786ed1303a01e6e4d439930cfd53a6afcd3a883b3c2be96e030181b7efd47ce079439a74e726329e5efbaaef9fcbeab533972b5507fe5583785de5

  • C:\Users\Admin\Desktop\Norton Download Manager.lnk

    Filesize

    1KB

    MD5

    ffde37fad050bc517bc36cea063a91ee

    SHA1

    6a9732bc8fe4ebe7bddf2695e8a0fa38278e53ad

    SHA256

    c5bec06f52fe357aaa4d3ec4b0cf5239e799edd81624f41196b39b08ef06ed20

    SHA512

    0d178f568bdb1a627ea80c71086d5269d62d7d615f4f1b0cdaeefa2cac272a152eabf2fbf76875c60a2a89fd08bf74da001b4c12f0a7e4a10f9e84db06baf7b5

  • C:\Users\Public\Downloads\Norton\{N360P_prod_1.19_4.1.0.32}\a9abd03899f9d0d30033a99d60d25aa3_JaffaCakes118.exe

    Filesize

    398KB

    MD5

    a9abd03899f9d0d30033a99d60d25aa3

    SHA1

    2400a2ece5fc5b69a95f232f5bf72d23492d4923

    SHA256

    b1d58ec9e1339af39852ad1d9af8eef47abf7e92d07bb0b86b9ead3118d0821e

    SHA512

    41c1413be4b712008b074077d3e31cce74da613f7c7e28a21fcc62f856a5e3ee2b8078cbfe253d635ad703ef669b9c0146a4c099e96a2a33fecc41ca0323b058

  • memory/628-20-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/628-0-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/628-1-0x00000000006B0000-0x00000000006B2000-memory.dmp

    Filesize

    8KB

  • memory/2196-19-0x0000000000670000-0x0000000000672000-memory.dmp

    Filesize

    8KB

  • memory/2196-31-0x0000000002290000-0x0000000002291000-memory.dmp

    Filesize

    4KB

  • memory/2196-32-0x0000000000670000-0x0000000000672000-memory.dmp

    Filesize

    8KB

  • memory/2196-33-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/2196-34-0x0000000002290000-0x0000000002291000-memory.dmp

    Filesize

    4KB

  • memory/2196-35-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB

  • memory/2196-46-0x0000000000400000-0x000000000055C000-memory.dmp

    Filesize

    1.4MB