Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe
-
Size
4.0MB
-
MD5
ac9527af3dc2de77b47d717b0629e4cf
-
SHA1
8b5b3581a604f3232471b5378842c1e7d92ea31d
-
SHA256
bca41f961316124abc29678918ad326b9a8832d880f89c3d56d0e4994506f18a
-
SHA512
9ceb53ab969e64c36b15e4b08e3d481ff0afc9a14c383a8c4407c052a4228ba30683d4ca9ebfa318660a7b0ddeaa094d148924ff43b499df7f1041f1a175dc9f
-
SSDEEP
98304:AqHAoxjZBLrAoNrv3h0FtVMbj3YDrQmxrCCXpaPirdu:AqnxjZBLcwrv36MbDorCCZa6rdu
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\scrss.exe = "\"C:\\Users\\Admin\\AppData\\Local\\scrss.exe \"" reg.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation setup.exe -
Executes dropped EXE 2 IoCs
pid Process 4616 setup.exe 4696 scrss.exe -
Loads dropped DLL 2 IoCs
pid Process 4696 scrss.exe 4696 scrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings setup.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3060 reg.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1992 vlc.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4616 setup.exe 4696 scrss.exe 4696 scrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1992 vlc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4616 setup.exe Token: 33 3964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3964 AUDIODG.EXE Token: 33 1992 vlc.exe Token: SeIncBasePriorityPrivilege 1992 vlc.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1992 vlc.exe 1992 vlc.exe 1992 vlc.exe 1992 vlc.exe 1992 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1992 vlc.exe 1992 vlc.exe 1992 vlc.exe 1992 vlc.exe 1992 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4696 scrss.exe 1992 vlc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4616 3080 ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe 87 PID 3080 wrote to memory of 4616 3080 ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe 87 PID 3080 wrote to memory of 4616 3080 ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe 87 PID 4616 wrote to memory of 1992 4616 setup.exe 88 PID 4616 wrote to memory of 1992 4616 setup.exe 88 PID 4616 wrote to memory of 4696 4616 setup.exe 89 PID 4616 wrote to memory of 4696 4616 setup.exe 89 PID 4616 wrote to memory of 4696 4616 setup.exe 89 PID 4616 wrote to memory of 2380 4616 setup.exe 90 PID 4616 wrote to memory of 2380 4616 setup.exe 90 PID 4616 wrote to memory of 2380 4616 setup.exe 90 PID 2380 wrote to memory of 2824 2380 cmd.exe 92 PID 2380 wrote to memory of 2824 2380 cmd.exe 92 PID 2380 wrote to memory of 2824 2380 cmd.exe 92 PID 2824 wrote to memory of 3060 2824 cmd.exe 93 PID 2824 wrote to memory of 3060 2824 cmd.exe 93 PID 2824 wrote to memory of 3060 2824 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac9527af3dc2de77b47d717b0629e4cf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\arash - pure love you can.mp3"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Users\Admin\AppData\Local\scrss.exe"C:\Users\Admin\AppData\Local\scrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c syscheck.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f5⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3060
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5b38de02725235587cf3402cb0195dded
SHA13ef072cd57c6a37cf04a3ad1a7d2d715ae65683c
SHA256197f2eec820ac24d9fad30e1b8ac3dd46a41a68211a53650308122e729bfaf4b
SHA5124190d610c656a58dc1f32528d9552b55764364053c068d64b0e14b7d80a239432d728e8423ae4758a53a1a511283e448da2e5b1c5c1ce3b5a20616306a38e84d
-
Filesize
168B
MD50d92b381efa1a49bd3cc2cf3ff28bd45
SHA123fac6be89436f94a4f8fca5057be514c787b9b6
SHA256b5b5a4055d2b10d9e6af0580c28ee9099632cc36eaa946ce442f65a77ee92e84
SHA51278b611a37cf21a0bb26204f0f3057b5d800be3c2ad8190af06725e82bdcc883473cb0087f1f7bc8c0199467d14282ea92d340421d8bf796f7e45451727f66391
-
Filesize
3.1MB
MD5a650b00f9e91ecf6c53ecb0c91fc5f1c
SHA1bafd216a8401ff544182eb3021be58f0b7281c34
SHA256b4ca8cb9c983ff3d08f31f974619b9311d81c6f30017d54e5ac93f0465b47250
SHA5123c65f729272f10fe07ec384f34610393f41b4de228aad4ee33cd19acce40237f85b324be6c4cdc89db43bc8b5a9678d7f32ebd8f1a9abdc0885a8ff5cb8dc57a
-
Filesize
92KB
MD58a5e40eb6518353e5758e5b237897c78
SHA1dd452e565485f48c2131dadc40a32b0d3007cef6
SHA2565f8ba5c1522847452d92b507770bfb454548d8a02232040c6be4323792400d4f
SHA512c941b82c3bd6be61506ac9215ab8e26983a8654444703b5a0236739a3b50a498ed0c65054b68481c026123d88b0f0e9e36f92b0f0028b4cc034345ec17f3b268
-
Filesize
237KB
MD5624edbd68e18dea398619afee2527dac
SHA1dd7d730ac852b950fbf7ea8d52bd13f4559b1c88
SHA2560c66024d2bcbab2b4bd0eb35ff970768cf98343cefc89cd0aff205bc7f93627f
SHA5124b99200b19165ddc966e901d35f1377738e4d8cbc5e56f359fa64733e83942088f742cf1637931eaa7796fd01f8f329e2b351cf8bdc98b318d6646b698f5e929