Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 21:07

General

  • Target

    ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe

  • Size

    4.0MB

  • MD5

    ac9527af3dc2de77b47d717b0629e4cf

  • SHA1

    8b5b3581a604f3232471b5378842c1e7d92ea31d

  • SHA256

    bca41f961316124abc29678918ad326b9a8832d880f89c3d56d0e4994506f18a

  • SHA512

    9ceb53ab969e64c36b15e4b08e3d481ff0afc9a14c383a8c4407c052a4228ba30683d4ca9ebfa318660a7b0ddeaa094d148924ff43b499df7f1041f1a175dc9f

  • SSDEEP

    98304:AqHAoxjZBLrAoNrv3h0FtVMbj3YDrQmxrCCXpaPirdu:AqnxjZBLcwrv36MbDorCCZa6rdu

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\arash - pure love you can.mp3"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1992
      • C:\Users\Admin\AppData\Local\scrss.exe
        "C:\Users\Admin\AppData\Local\scrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4696
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c syscheck.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f
            5⤵
            • Adds policy Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3060
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x51c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          3.6MB

          MD5

          b38de02725235587cf3402cb0195dded

          SHA1

          3ef072cd57c6a37cf04a3ad1a7d2d715ae65683c

          SHA256

          197f2eec820ac24d9fad30e1b8ac3dd46a41a68211a53650308122e729bfaf4b

          SHA512

          4190d610c656a58dc1f32528d9552b55764364053c068d64b0e14b7d80a239432d728e8423ae4758a53a1a511283e448da2e5b1c5c1ce3b5a20616306a38e84d

        • C:\Users\Admin\AppData\Local\Temp\syscheck.bat

          Filesize

          168B

          MD5

          0d92b381efa1a49bd3cc2cf3ff28bd45

          SHA1

          23fac6be89436f94a4f8fca5057be514c787b9b6

          SHA256

          b5b5a4055d2b10d9e6af0580c28ee9099632cc36eaa946ce442f65a77ee92e84

          SHA512

          78b611a37cf21a0bb26204f0f3057b5d800be3c2ad8190af06725e82bdcc883473cb0087f1f7bc8c0199467d14282ea92d340421d8bf796f7e45451727f66391

        • C:\Users\Admin\AppData\Local\arash - pure love you can.mp3

          Filesize

          3.1MB

          MD5

          a650b00f9e91ecf6c53ecb0c91fc5f1c

          SHA1

          bafd216a8401ff544182eb3021be58f0b7281c34

          SHA256

          b4ca8cb9c983ff3d08f31f974619b9311d81c6f30017d54e5ac93f0465b47250

          SHA512

          3c65f729272f10fe07ec384f34610393f41b4de228aad4ee33cd19acce40237f85b324be6c4cdc89db43bc8b5a9678d7f32ebd8f1a9abdc0885a8ff5cb8dc57a

        • C:\Users\Admin\AppData\Local\ntldr.dll

          Filesize

          92KB

          MD5

          8a5e40eb6518353e5758e5b237897c78

          SHA1

          dd452e565485f48c2131dadc40a32b0d3007cef6

          SHA256

          5f8ba5c1522847452d92b507770bfb454548d8a02232040c6be4323792400d4f

          SHA512

          c941b82c3bd6be61506ac9215ab8e26983a8654444703b5a0236739a3b50a498ed0c65054b68481c026123d88b0f0e9e36f92b0f0028b4cc034345ec17f3b268

        • C:\Users\Admin\AppData\Local\scrss.exe

          Filesize

          237KB

          MD5

          624edbd68e18dea398619afee2527dac

          SHA1

          dd7d730ac852b950fbf7ea8d52bd13f4559b1c88

          SHA256

          0c66024d2bcbab2b4bd0eb35ff970768cf98343cefc89cd0aff205bc7f93627f

          SHA512

          4b99200b19165ddc966e901d35f1377738e4d8cbc5e56f359fa64733e83942088f742cf1637931eaa7796fd01f8f329e2b351cf8bdc98b318d6646b698f5e929

        • memory/1992-55-0x00007FFF65EB0000-0x00007FFF65EC1000-memory.dmp

          Filesize

          68KB

        • memory/1992-43-0x00007FFF6C420000-0x00007FFF6C431000-memory.dmp

          Filesize

          68KB

        • memory/1992-71-0x00007FFF5AC40000-0x00007FFF5BCF0000-memory.dmp

          Filesize

          16.7MB

        • memory/1992-61-0x00007FFF5BF00000-0x00007FFF5C1B6000-memory.dmp

          Filesize

          2.7MB

        • memory/1992-39-0x00007FFF6C660000-0x00007FFF6C694000-memory.dmp

          Filesize

          208KB

        • memory/1992-38-0x00007FF6CBCA0000-0x00007FF6CBD98000-memory.dmp

          Filesize

          992KB

        • memory/1992-40-0x00007FFF5BF00000-0x00007FFF5C1B6000-memory.dmp

          Filesize

          2.7MB

        • memory/1992-47-0x00007FFF69B70000-0x00007FFF69B81000-memory.dmp

          Filesize

          68KB

        • memory/1992-46-0x00007FFF6B4A0000-0x00007FFF6B4BD000-memory.dmp

          Filesize

          116KB

        • memory/1992-49-0x00007FFF628F0000-0x00007FFF62931000-memory.dmp

          Filesize

          260KB

        • memory/1992-48-0x00007FFF5BCF0000-0x00007FFF5BEFB000-memory.dmp

          Filesize

          2.0MB

        • memory/1992-45-0x00007FFF6B590000-0x00007FFF6B5A1000-memory.dmp

          Filesize

          68KB

        • memory/1992-44-0x00007FFF6BAC0000-0x00007FFF6BAD7000-memory.dmp

          Filesize

          92KB

        • memory/1992-51-0x00007FFF69830000-0x00007FFF69851000-memory.dmp

          Filesize

          132KB

        • memory/1992-42-0x00007FFF6C780000-0x00007FFF6C797000-memory.dmp

          Filesize

          92KB

        • memory/1992-41-0x00007FFF75530000-0x00007FFF75548000-memory.dmp

          Filesize

          96KB

        • memory/1992-52-0x00007FFF695F0000-0x00007FFF69608000-memory.dmp

          Filesize

          96KB

        • memory/1992-53-0x00007FFF695D0000-0x00007FFF695E1000-memory.dmp

          Filesize

          68KB

        • memory/1992-56-0x00007FFF58D90000-0x00007FFF58DA7000-memory.dmp

          Filesize

          92KB

        • memory/1992-54-0x00007FFF65ED0000-0x00007FFF65EE1000-memory.dmp

          Filesize

          68KB

        • memory/1992-50-0x00007FFF5AC40000-0x00007FFF5BCF0000-memory.dmp

          Filesize

          16.7MB

        • memory/3080-0-0x0000000002170000-0x0000000002171000-memory.dmp

          Filesize

          4KB

        • memory/3080-9-0x0000000004000000-0x0000000004414000-memory.dmp

          Filesize

          4.1MB

        • memory/4616-32-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/4696-57-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/4696-58-0x00000000005C0000-0x00000000005DC000-memory.dmp

          Filesize

          112KB

        • memory/4696-29-0x00000000005C0000-0x00000000005DC000-memory.dmp

          Filesize

          112KB