Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 00:37

General

  • Target

    d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe

  • Size

    315KB

  • MD5

    d3287543011ce991dbefc28ff64ac1dc

  • SHA1

    c97c327779a2647223a87043bb64612c1b4c3be6

  • SHA256

    48ce8638debabcbf96c5c8e400aeaa3e4572c86d3358cba7f9ae2c2937f1bf25

  • SHA512

    fecad934642c4cda9a29898d59cb0612bb227d8dfdcc7462b5f699ca9b10c8d03da6d5ce98ccece95a7fa94a1abed32bf27b4f9a39568d9ba8f5657fe84c5f1e

  • SSDEEP

    6144:RdtMLJKTCFFFFFFFF8LCi7G5VMB8befVf8kly3FRe:RzyK+FFFFFFFFmLG5w8yfV04y3/e

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2528
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4288
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d3287543011ce991dbefc28ff64ac1dc_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4600
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrss.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1220
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrss.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3148
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4264,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:8
    1⤵
      PID:2316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1768-0-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-2-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-4-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-3-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-11-0x0000000075610000-0x0000000075700000-memory.dmp

      Filesize

      960KB

    • memory/1768-10-0x0000000075631000-0x0000000075632000-memory.dmp

      Filesize

      4KB

    • memory/1768-12-0x0000000075610000-0x0000000075700000-memory.dmp

      Filesize

      960KB

    • memory/1768-13-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-14-0x0000000075610000-0x0000000075700000-memory.dmp

      Filesize

      960KB

    • memory/1768-15-0x0000000075610000-0x0000000075700000-memory.dmp

      Filesize

      960KB

    • memory/1768-18-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-21-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-24-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-27-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-31-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-34-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-37-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-40-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-44-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-47-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-51-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-54-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/1768-57-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB