Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 00:53

General

  • Target

    b9ba72364f223d78212e9d38b502923b_JaffaCakes118.exe

  • Size

    147KB

  • MD5

    b9ba72364f223d78212e9d38b502923b

  • SHA1

    9d6c3128a6842aa900ebdfa63b7cc8009bf0b29b

  • SHA256

    6160bff7b553c0f2d4a3e243731c8ef50e73813b7e6d9c8f2c3d2e5ed192e3b0

  • SHA512

    292086223cd2ee1537083b146504d0902044d0b0ab58d85b083d03431b87e6168038a672455591dd3fbbdfa77ba7782e4b2bac8bd8e1b0dc02b5bf8a21012b8e

  • SSDEEP

    3072:4HcMMv84jRd+cdCltQ9WRUyoUt4oMk6AdJ3Lr7mryWx:4Md+TKyt4oMk6ktLr7mrz

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9ba72364f223d78212e9d38b502923b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b9ba72364f223d78212e9d38b502923b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\b9ba72364f223d78212e9d38b502923b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b9ba72364f223d78212e9d38b502923b_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3448
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe "C:\Users\Admin\AppData\Local\Temp\MSWINSCK.OCX" /s
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSWINSCK.OCX

    Filesize

    15KB

    MD5

    9831d56f861601f50b8e97eae97c4f3b

    SHA1

    a08a888b7b0ab157740c450c10ae87e32dec8ba7

    SHA256

    d08c94f834d5b1c9ec3c2f6572d1a412cbe377ea60ea68d61e2bb4ad6437ad52

    SHA512

    4055147ac2633434bcb0ed1a14f7a446c9da633de6fd2e25257cd09a73a82aa2ab554ab3a2c5b5a65e04067810884789215aca4cc6dd57344a8ebb3529263fbb

  • C:\Users\Admin\AppData\Local\Temp\edb5819s3b1.exe.jpg

    Filesize

    147KB

    MD5

    b9ba72364f223d78212e9d38b502923b

    SHA1

    9d6c3128a6842aa900ebdfa63b7cc8009bf0b29b

    SHA256

    6160bff7b553c0f2d4a3e243731c8ef50e73813b7e6d9c8f2c3d2e5ed192e3b0

    SHA512

    292086223cd2ee1537083b146504d0902044d0b0ab58d85b083d03431b87e6168038a672455591dd3fbbdfa77ba7782e4b2bac8bd8e1b0dc02b5bf8a21012b8e

  • memory/3448-2-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/3448-3-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/3448-5-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/3448-10-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/3448-13-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/3448-39-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB