Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 01:06

General

  • Target

    d56a0c5c4f40f1d08cb920f4d255beea_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    d56a0c5c4f40f1d08cb920f4d255beea

  • SHA1

    bfc7d99c3d49c32b975ee209dce4050cfa0d0255

  • SHA256

    27c94a4becbd6f0f35af5a8aa12475cd0827c09307cd3aa9cfcfb04103aef209

  • SHA512

    61ca24d422a984558eae37f24ab20a835ed2f7677bddbdd9d1aaeb335d34c6dded7b4f24dd263722aa3ea7548bbf558e727c90c1758784132d5e87e7268d7e05

  • SSDEEP

    1536:gR6XqqElo6jEzoa8AmwmQM3IyvbnWkakKm9mbvGOOO0u4rY9bbTNo+g7jp/367oo:NQra8ADkWZnOORAmHC+wp/3vACiHBs4

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Drivers directory 34 IoCs
  • Checks computer location settings 2 TTPs 34 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 34 IoCs
  • Drops file in System32 directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 35 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d56a0c5c4f40f1d08cb920f4d255beea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d56a0c5c4f40f1d08cb920f4d255beea_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Windows\SysWOW64\vqjshsju.exe
      "C:\Windows\system32\vqjshsju.exe" 7
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Drops file in Drivers directory
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Windows\SysWOW64\asppmlxa.exe
        "C:\Windows\system32\asppmlxa.exe" 7
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Drops file in Drivers directory
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4388
        • C:\Windows\SysWOW64\pqcawc.exe
          "C:\Windows\system32\pqcawc.exe" 7
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Drops file in Drivers directory
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Windows\SysWOW64\tlxvmdsl.exe
            "C:\Windows\system32\tlxvmdsl.exe" 7
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Drops file in Drivers directory
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2900
            • C:\Windows\SysWOW64\pwncl.exe
              "C:\Windows\system32\pwncl.exe" 7
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Drops file in Drivers directory
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1652
              • C:\Windows\SysWOW64\lichll.exe
                "C:\Windows\system32\lichll.exe" 7
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Drops file in Drivers directory
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2668
                • C:\Windows\SysWOW64\faflnwh.exe
                  "C:\Windows\system32\faflnwh.exe" 7
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Drops file in Drivers directory
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3280
                  • C:\Windows\SysWOW64\kscv.exe
                    "C:\Windows\system32\kscv.exe" 7
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Drops file in Drivers directory
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3360
                    • C:\Windows\SysWOW64\oojbimo.exe
                      "C:\Windows\system32\oojbimo.exe" 7
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Drops file in Drivers directory
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3068
                      • C:\Windows\SysWOW64\yvigha.exe
                        "C:\Windows\system32\yvigha.exe" 7
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Drops file in Drivers directory
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:5028
                        • C:\Windows\SysWOW64\kcasuwis.exe
                          "C:\Windows\system32\kcasuwis.exe" 7
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Drops file in Drivers directory
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3860
                          • C:\Windows\SysWOW64\gnoxu.exe
                            "C:\Windows\system32\gnoxu.exe" 7
                            13⤵
                            • Boot or Logon Autostart Execution: Active Setup
                            • Drops file in Drivers directory
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3832
                            • C:\Windows\SysWOW64\rtdtvbna.exe
                              "C:\Windows\system32\rtdtvbna.exe" 7
                              14⤵
                              • Boot or Logon Autostart Execution: Active Setup
                              • Drops file in Drivers directory
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2016
                              • C:\Windows\SysWOW64\guwi.exe
                                "C:\Windows\system32\guwi.exe" 7
                                15⤵
                                • Boot or Logon Autostart Execution: Active Setup
                                • Drops file in Drivers directory
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:2932
                                • C:\Windows\SysWOW64\ymonit.exe
                                  "C:\Windows\system32\ymonit.exe" 7
                                  16⤵
                                  • Boot or Logon Autostart Execution: Active Setup
                                  • Drops file in Drivers directory
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4344
                                  • C:\Windows\SysWOW64\uynefmmk.exe
                                    "C:\Windows\system32\uynefmmk.exe" 7
                                    17⤵
                                    • Boot or Logon Autostart Execution: Active Setup
                                    • Drops file in Drivers directory
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:3440
                                    • C:\Windows\SysWOW64\ridx.exe
                                      "C:\Windows\system32\ridx.exe" 7
                                      18⤵
                                      • Boot or Logon Autostart Execution: Active Setup
                                      • Drops file in Drivers directory
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:2724
                                      • C:\Windows\SysWOW64\dnkap.exe
                                        "C:\Windows\system32\dnkap.exe" 7
                                        19⤵
                                        • Boot or Logon Autostart Execution: Active Setup
                                        • Drops file in Drivers directory
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of WriteProcessMemory
                                        PID:4264
                                        • C:\Windows\SysWOW64\kcaf.exe
                                          "C:\Windows\system32\kcaf.exe" 7
                                          20⤵
                                          • Boot or Logon Autostart Execution: Active Setup
                                          • Drops file in Drivers directory
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:4740
                                          • C:\Windows\SysWOW64\rtjoht.exe
                                            "C:\Windows\system32\rtjoht.exe" 7
                                            21⤵
                                            • Boot or Logon Autostart Execution: Active Setup
                                            • Drops file in Drivers directory
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:2884
                                            • C:\Windows\SysWOW64\xluote.exe
                                              "C:\Windows\system32\xluote.exe" 7
                                              22⤵
                                              • Boot or Logon Autostart Execution: Active Setup
                                              • Drops file in Drivers directory
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:1608
                                              • C:\Windows\SysWOW64\pfin.exe
                                                "C:\Windows\system32\pfin.exe" 7
                                                23⤵
                                                • Boot or Logon Autostart Execution: Active Setup
                                                • Drops file in Drivers directory
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                PID:4984
                                                • C:\Windows\SysWOW64\olrdbfh.exe
                                                  "C:\Windows\system32\olrdbfh.exe" 7
                                                  24⤵
                                                  • Boot or Logon Autostart Execution: Active Setup
                                                  • Drops file in Drivers directory
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5028
                                                  • C:\Windows\SysWOW64\mroun.exe
                                                    "C:\Windows\system32\mroun.exe" 7
                                                    25⤵
                                                    • Boot or Logon Autostart Execution: Active Setup
                                                    • Drops file in Drivers directory
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1504
                                                    • C:\Windows\SysWOW64\dmfked.exe
                                                      "C:\Windows\system32\dmfked.exe" 7
                                                      26⤵
                                                      • Boot or Logon Autostart Execution: Active Setup
                                                      • Drops file in Drivers directory
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4656
                                                      • C:\Windows\SysWOW64\yvlxt.exe
                                                        "C:\Windows\system32\yvlxt.exe" 7
                                                        27⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Drops file in Drivers directory
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1140
                                                        • C:\Windows\SysWOW64\yycko.exe
                                                          "C:\Windows\system32\yycko.exe" 7
                                                          28⤵
                                                          • Boot or Logon Autostart Execution: Active Setup
                                                          • Drops file in Drivers directory
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4164
                                                          • C:\Windows\SysWOW64\ycrwk.exe
                                                            "C:\Windows\system32\ycrwk.exe" 7
                                                            29⤵
                                                            • Boot or Logon Autostart Execution: Active Setup
                                                            • Drops file in Drivers directory
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4580
                                                            • C:\Windows\SysWOW64\meynu.exe
                                                              "C:\Windows\system32\meynu.exe" 7
                                                              30⤵
                                                              • Boot or Logon Autostart Execution: Active Setup
                                                              • Drops file in Drivers directory
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1652
                                                              • C:\Windows\SysWOW64\nfxhuhn.exe
                                                                "C:\Windows\system32\nfxhuhn.exe" 7
                                                                31⤵
                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                • Drops file in Drivers directory
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2612
                                                                • C:\Windows\SysWOW64\jqmnuxeh.exe
                                                                  "C:\Windows\system32\jqmnuxeh.exe" 7
                                                                  32⤵
                                                                  • Boot or Logon Autostart Execution: Active Setup
                                                                  • Drops file in Drivers directory
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3404
                                                                  • C:\Windows\SysWOW64\nlbpyjsg.exe
                                                                    "C:\Windows\system32\nlbpyjsg.exe" 7
                                                                    33⤵
                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                    • Drops file in Drivers directory
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1304
                                                                    • C:\Windows\SysWOW64\ckmlpny.exe
                                                                      "C:\Windows\system32\ckmlpny.exe" 7
                                                                      34⤵
                                                                      • Boot or Logon Autostart Execution: Active Setup
                                                                      • Drops file in Drivers directory
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:640
                                                                      • C:\Windows\SysWOW64\icxlcyh.exe
                                                                        "C:\Windows\system32\icxlcyh.exe" 7
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3196
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8
    1⤵
      PID:1148

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\vqjshsju.exe

      Filesize

      136KB

      MD5

      d56a0c5c4f40f1d08cb920f4d255beea

      SHA1

      bfc7d99c3d49c32b975ee209dce4050cfa0d0255

      SHA256

      27c94a4becbd6f0f35af5a8aa12475cd0827c09307cd3aa9cfcfb04103aef209

      SHA512

      61ca24d422a984558eae37f24ab20a835ed2f7677bddbdd9d1aaeb335d34c6dded7b4f24dd263722aa3ea7548bbf558e727c90c1758784132d5e87e7268d7e05

    • C:\Windows\system32\drivers\etc\services

      Filesize

      17KB

      MD5

      258a17ba44674799317a5918a92859fa

      SHA1

      e8ce488145017017ab2cfc47e1a12721e802b4c3

      SHA256

      c1723f7f29b224c42f26452c3efa8f80f6ee8500ee78513e0c0732ba55399f7d

      SHA512

      5bbee0dfee4d26f2690dc475a4135cdd6d59d0b666044c4673285a9d699af1ecf8505ce77a067c998d2c40025df67899ef649b55e77d660eb875c413b8ff8fa4

    • memory/640-369-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1140-306-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1304-360-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1504-288-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1608-261-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1652-333-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1652-70-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2016-165-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2520-45-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2612-342-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2668-82-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2724-214-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2884-250-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2900-58-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2932-178-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3068-117-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3196-370-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3280-94-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3360-106-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3404-351-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3440-202-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3832-154-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3860-141-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4164-315-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4232-22-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4264-225-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4344-189-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4388-34-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4580-324-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4656-297-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4656-10-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4740-238-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4984-270-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/5028-279-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/5028-130-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB