Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 22:30

General

  • Target

    d533b2373d6d1ffeaaf180bfdc46a20a_JaffaCakes118.exe

  • Size

    539KB

  • MD5

    d533b2373d6d1ffeaaf180bfdc46a20a

  • SHA1

    0d3391b39814b4263fe6c9b04f97d1eb7a4c5a25

  • SHA256

    957a4053d9da1b2d35aa367b0e492fb8d374b4699ba72cf18420c291ac6bc1eb

  • SHA512

    5af3ec503b3127b3a35873e1dba35023ed9cda79f75aff784c4952452ab9687b4bddb81f634c65059367fca1f4f110f2ced221ace68fdf10d026bf9dd40b0563

  • SSDEEP

    12288:Xu67+d02hEDhsrqNBvs4aJOO7d5NMyUaUw+:X3sPhdrqNByJv7d5NMDvw+

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 42 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d533b2373d6d1ffeaaf180bfdc46a20a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d533b2373d6d1ffeaaf180bfdc46a20a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Modifies registry class
      PID:4356
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:5004
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
    1⤵
      PID:3252
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1524
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4604

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133703082646519247.txt

            Filesize

            75KB

            MD5

            5476ffa388abf723eca71c61a2428515

            SHA1

            68fb6aa87619593479fb57b42a826e62710f1271

            SHA256

            a1e8dcd431b9e196fd851b87e339dbf781a27be916883f33a0d620e6cd37cde1

            SHA512

            7da346b908c927c0b4e1b0e91abfb624a6bc2b75dd2cbc32ee3861096e92d81faa38762e7e5e95a8bf4db19de8bc69a0bf28fe40dc66ae3c2a36bd789a883fcc

          • memory/3264-33-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-2-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-4-0x00000205612A0000-0x00000205612A8000-memory.dmp

            Filesize

            32KB

          • memory/3264-5-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-6-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-7-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-17-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-41-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-1-0x000002055F4E0000-0x000002055F5F2000-memory.dmp

            Filesize

            1.1MB

          • memory/3264-32-0x00007FFEC1133000-0x00007FFEC1135000-memory.dmp

            Filesize

            8KB

          • memory/3264-3-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-0-0x00007FFEC1133000-0x00007FFEC1135000-memory.dmp

            Filesize

            8KB

          • memory/3264-22-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-179-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-178-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-177-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-157-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/3264-43-0x00007FFEC1130000-0x00007FFEC1BF1000-memory.dmp

            Filesize

            10.8MB

          • memory/4604-74-0x0000021222010000-0x0000021222030000-memory.dmp

            Filesize

            128KB

          • memory/4604-54-0x0000021221C00000-0x0000021221C20000-memory.dmp

            Filesize

            128KB

          • memory/4604-36-0x0000021220B00000-0x0000021220C00000-memory.dmp

            Filesize

            1024KB

          • memory/4604-42-0x0000021221C40000-0x0000021221C60000-memory.dmp

            Filesize

            128KB

          • memory/5004-35-0x0000000004850000-0x0000000004851000-memory.dmp

            Filesize

            4KB