Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 12:00
Behavioral task
behavioral1
Sample
b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe
-
Size
82KB
-
MD5
b78baf80196205b8c20a11db8dbbb706
-
SHA1
91c82ee1715783e6cb9abf2edb604d9b3ed4cb78
-
SHA256
2b1fdf0cfed473ccc823aff5820f3b1d9b48e917904acb78743c359cee306db0
-
SHA512
1388ef6e3aa34e74a4f724f1d3e90ed0b8b5af5c40c4d4dde7f50be91f4e2b8e1fac5c2e40fac3918e192a1eaad975230d5b3ae13b8a9c39960d10ca390c3d90
-
SSDEEP
1536:MKfipdnIY1OyiptUSwZsM771CLCS1nxBhVpasQ2Q0xEwj:MKSdrI3ptM77o22nxBbpasQ2Qq1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023437-31.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Exploters.exe -
Executes dropped EXE 3 IoCs
pid Process 3988 Exploters.exe 3992 crack.exe 548 w32_ss.exe -
Loads dropped DLL 1 IoCs
pid Process 548 w32_ss.exe -
resource yara_rule behavioral2/memory/2632-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2632-35-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Modifies WinLogon 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify Exploters.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\debugg\DllName = "debugg.dll" Exploters.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\debugg\Startup = "MemManager" Exploters.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\debugg\Impersonate = "1" Exploters.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\debugg\Asynchronous = "1" Exploters.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\debugg\MaxWait = "1" Exploters.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\debugg Exploters.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\c3.sys Exploters.exe File opened for modification C:\Windows\SysWOW64\w32_ss.exe Exploters.exe File created C:\Windows\SysWOW64\debugg.dll Exploters.exe File created C:\Windows\SysWOW64\c3.dll Exploters.exe File created C:\Windows\SysWOW64\sdmapi.sys Exploters.exe File opened for modification C:\Windows\SysWOW64\sdmapi.sys Exploters.exe File opened for modification C:\Windows\SysWOW64\klogini.dll w32_ss.exe File opened for modification C:\Windows\SysWOW64\sdmapi.sys w32_ss.exe File opened for modification C:\Windows\SysWOW64\boot32.sys Exploters.exe File created C:\Windows\SysWOW64\c4.sys Exploters.exe File opened for modification C:\Windows\SysWOW64\p2.ini w32_ss.exe File opened for modification C:\Windows\SysWOW64\ps.a3d w32_ss.exe File created C:\Windows\SysWOW64\w32_ss.exe Exploters.exe File created C:\Windows\SysWOW64\boot32.sys Exploters.exe File created C:\Windows\SysWOW64\p2.ini Exploters.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32_ss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exploters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 548 w32_ss.exe 548 w32_ss.exe 548 w32_ss.exe 548 w32_ss.exe 548 w32_ss.exe 548 w32_ss.exe 548 w32_ss.exe 548 w32_ss.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 548 w32_ss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3988 2632 b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe 84 PID 2632 wrote to memory of 3988 2632 b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe 84 PID 2632 wrote to memory of 3988 2632 b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe 84 PID 2632 wrote to memory of 3992 2632 b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe 85 PID 2632 wrote to memory of 3992 2632 b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe 85 PID 2632 wrote to memory of 3992 2632 b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe 85 PID 3988 wrote to memory of 548 3988 Exploters.exe 86 PID 3988 wrote to memory of 548 3988 Exploters.exe 86 PID 3988 wrote to memory of 548 3988 Exploters.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b78baf80196205b8c20a11db8dbbb706_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Exploters.exeC:\Users\Admin\AppData\Local\Temp\Exploters.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\w32_ss.exe"C:\Windows\System32\w32_ss.exe" !!3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:548
-
-
-
C:\Users\Admin\AppData\Local\Temp\crack.exeC:\Users\Admin\AppData\Local\Temp\crack.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5d35f57feca073bb1319fd8d20d4521f4
SHA1f5edc27ee463a38a93656f2cda8807dcb665ad1b
SHA256634e698173345cc5c35806445e797dfd3ef4811104f3e4882dd97a8facd35d81
SHA5121f2e552615ac059daa96f8a4db89343d269572d250558880c27d1e0c6299c93370b4d10659699caf37a6559ae99cacaa075906516bd63704809299ff0c7fa509
-
Filesize
32KB
MD5abbce35302e1107e5276ac3b38663514
SHA1decdb041499f9351ff299f7218094b956e036904
SHA256b46662d005fe124df37aff2934e0b9aee5913ebc533510e37392bd15c3cf6ea9
SHA5121567b6409f93ccc96077342dc9f19f025d3d79d55a99772e594c1933f66ab77b5962d82c37d6dd9ecbf106d526b2d3e87e1595296858058446624d6301edb02a
-
Filesize
14KB
MD5b1f824677325bc9ea4329760c294bcea
SHA1a2dd9d48e04659896ada76d2b16c5f05313b83c9
SHA25673a23bffa03ae0d4822a30599cf461d5777dea958b043b787dff995b2963f806
SHA51294aec6afc1b8e5235b10d19aceb6d5e2c3dc53197af6d17ad977319b6fc4c4305d4a24cbdbc033f1fc2127fe3bcf6bd77d723280155841952449f4f2de448b8d
-
Filesize
65KB
MD5fcf734a0440914c9b5e02b3e8b50f598
SHA153447f20c62a3fba8573ba8b966a2ccc8c9ea95b
SHA2568e7bde246502eb21e8c2b3dda0d414bc688ddb596d3910066591ae95e6d72c52
SHA512a819e61c790507957de5c752e292a6b96649de578f2591660c4477479653300dcd877e21dbe34fe52b7714de8b7699b6d376784b89082590938196646fb293b5