Analysis

  • max time kernel
    138s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 02:14

General

  • Target

    b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    b9f7e7bb29cc01b00d99ae1bbd100902

  • SHA1

    c548dd900e27d1864fe11f01b0023eaca655d2d6

  • SHA256

    19a19bc0d80208e9f627d123208d225e8b7c1db37d2dc5559e46c8a130920ca0

  • SHA512

    93171f3e6df3572c578c9b97758feb8315eea517d8893ec4c37c087bd0640b202af8088fd00c9d75af8ed7af11e50e2c4b3eea6ad0555397e2c970fbbe219a6b

  • SSDEEP

    768:2yu3jDsGtGHMCuDcg4yHIN+e/KYIEnIOX4fQGW8B0eaVAy+0ZEqhlNC+NPKwV9OC:JhbuDXHI1iZExj8BLy/ZDhlw+sYQ+B

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\GSGPY44P.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4264
    • C:\Windows\SysWOW64\GSGPY44.exe
      C:\Windows\system32\GSGPY44.exe
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1504
    • C:\Windows\SysWOW64\0L5ZIO1.exe
      "C:\Windows\system32\0L5ZIO1.exe" -jscript
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\0L5ZIO1.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4508
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B9F7E7~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3944
  • C:\Windows\SysWOW64\25BLVR54.com
    C:\Windows\SysWOW64\25BLVR54.com -kLocalService
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\SysWOW64\25BLVR54.com
      C:\Windows\SysWOW64\25BLVR54.com
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\GSGPY44P.bat

    Filesize

    1KB

    MD5

    97ef49d998b5204b08c2d02c733b0a04

    SHA1

    a4872c655d4728cdfb511edd6c2f91f5a25f64b0

    SHA256

    3516f67f54bb45d75bc3424aaecec3700dfcd8b9ae4be3f004502c65d1e80ac8

    SHA512

    ccd1c959c4f8418cdcded9a15e20879490cc046f96f60cd1e27ba76c00687549b336c2663f0687c6d5c4d382a8dc6cde836833affcf0ecbd1700437c8fdfed32

  • C:\Windows\SysWOW64\0L5ZIO1.exe

    Filesize

    24KB

    MD5

    72acc2edb98f5ab3e1b23e8f19f71de0

    SHA1

    5196ef0f8f0757068d525b729537afe9dc64a53f

    SHA256

    119b12d33a466f3085c4280987355c636e7250073a263cd2e82312fd5282d66b

    SHA512

    92edd41d986d97de49e115d15e3e5827e5ec741c190b7cefe21c887e102a139d4078357d8454b2bb8ff119e6ad50a1b5154f6795e6112ab804a1724c2c17839c

  • C:\Windows\SysWOW64\12528438.txt

    Filesize

    35B

    MD5

    be3fbe6c2aa34249dad09147175128f2

    SHA1

    da30d3ee2421c19b6194fb325ceca501e09accd8

    SHA256

    54d6bf3cf1d62dbed391ed83f5b67690ce3c007bc4b8a7bc946cbd9e62516aae

    SHA512

    4d323fbe3dcc895578a8da828381b031b8616ccc7639fc1be1af37cb29fe1c8a675815542c565e1512dda5b2af14fed40982da18c2765fbb704457606f45464d

  • C:\Windows\SysWOW64\GSGPY44.exe

    Filesize

    44KB

    MD5

    677b2627cf1131549e18893b1d9d4374

    SHA1

    47542beb77b5a153d201553d1acd90da592c1d58

    SHA256

    7bc93272147d647ec80c9cc1da44734d4fb2f0d29d15f53f42cf113cf65c6b89

    SHA512

    88a95eec90ac26f7941ff36f75815a959b7faaddb65a624fe27dea48885e1db4a7842d990095a835dc392cc02581762c15de12b024c2f608679977c31855c4f6