Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 17:30

General

  • Target

    d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe

  • Size

    11.4MB

  • MD5

    d6caf3179dc94ffd1052f2a526390db6

  • SHA1

    9c53c8bffcbbbe02fef88144d3fde1b8570695e1

  • SHA256

    cfb6fb3812e6bfd9011254c6c40d030ff98cd80e72be1e98836d8da055525ea5

  • SHA512

    d597e90035a9054cd0233bff5c18025e48fcad490b577c493f3a5d6bf8cc462511ae19417c2637851ba4e0435beb0cec028c2d5ba99676e99392c1d3c77e2b82

  • SSDEEP

    196608:UTwx42RPPBdebEm1iWWHc1SUX6apg3ZhncrJPm59vzgO8L1vsqFRUo7t/IbsCTM9:UaRPiGWW8sUtu/Am5q91vsqFRn5AACTM

Malware Config

Signatures

  • Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks system information in the registry 2 TTPs 1 IoCs

    System information is often read in order to detect sandboxing environments.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\7772.tmp
      "C:\Users\Admin\AppData\Local\Temp\7772.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Users\Admin\AppData\Local\Temp\789B.tmp
        "C:\Users\Admin\AppData\Local\Temp\789B.tmp"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Users\Admin\AppData\Local\Temp\789B.tmp
          "C:\Users\Admin\AppData\Local\Temp\789B.tmp" /test
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1016
        • C:\Users\Admin\AppData\Local\Temp\789B.tmp
          "C:\Users\Admin\AppData\Local\Temp\789B.tmp" /restart /util
          4⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Looks for VirtualBox Guest Additions in registry
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks system information in the registry
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1816
      • C:\Users\Admin\AppData\Local\Temp\7938.tmp
        "C:\Users\Admin\AppData\Local\Temp\7938.tmp" "install"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2016
  • C:\Users\Admin\AppData\Local\Temp\7938.tmp
    "C:\Users\Admin\AppData\Local\Temp\7938.tmp" run
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Чистилка\config.dat

    Filesize

    476KB

    MD5

    21f6343d000085f66de7d183f8183f60

    SHA1

    927acfd39d2f9e80026cb14139f8a9cfab55b944

    SHA256

    adc43a71c14753589f0a0eaa456d25ca297df785281a5e76cabc89999d7f8e25

    SHA512

    59b3c94d9f73334f533f2e0656fd61f167872079ea64115b1934dbc673f588710176e7339d2916c2d9b7ce93d7e83d356a1c96c58f8f1b33df068a4e7842976b

  • C:\ProgramData\Чистилка\settings.json

    Filesize

    445B

    MD5

    490848c76216309b898dfd8dcae3a6b9

    SHA1

    65ad0cd3df535b1570d6fb4fd101220628355186

    SHA256

    a6483b680183bda7e03538e7a9d0c16867faa4af199d24d583cdb9a7a117c690

    SHA512

    cc9f88342cd26a210fb993f8f6840cac73dd6b1de52e00a56f2ab71ae8a973831f2d1c8c5ca8bd91df96fe67796b13072cb2ab7fd8726dabb8754691000d64a1

  • C:\Users\Admin\AppData\Local\Temp\7772.tmp

    Filesize

    11.0MB

    MD5

    bd670fcd41f77f519213dfad74496e87

    SHA1

    ee77369da0985f2c7c863bece458b2ea60154cc8

    SHA256

    a8c6b192ca4f2e208630d561ca88a9d5902afb050bcedbccecba0e3206eaef40

    SHA512

    b1f055076120b51e9918c0cb2fca4943112685ec662d76a459680392dff5d3edfcc6a2576edf45ddd247b879ba5fe0b64c17ea556daa48928ef99058af85c683

  • C:\Users\Admin\AppData\Local\Temp\789B.tmp

    Filesize

    10.3MB

    MD5

    d26a10f1d736b6f3e8950ac87e08b073

    SHA1

    52377ff734ab8ecfbc77ff3f953ac5d187dfb8fe

    SHA256

    78b4db9798882b192bcf43f41655c8debdab5f295e7cd2429657c6022a1a7f98

    SHA512

    1bc265b8f50dd332b58761b443faac71382d743bfdfc61e2bce1225714cb6364e40bffb2c92fa869df9e8e64efd3c52a78cc33d18011d1586d4f00bebdf3157e

  • C:\Users\Admin\AppData\Local\Temp\789B.tmp

    Filesize

    5.9MB

    MD5

    d7ebb78bf1f0e4a8278b2d63013b1134

    SHA1

    498b315dcba9bf4403d6748be61453d5d8991b61

    SHA256

    c5a685088c44b1fbd01f49587af753b6a0f8f793de8d3b3d7e170574fef27ba8

    SHA512

    ead20a19b5262ce34f13bae9c9d1082ce5bf740759ea82042d83600094e38de7aea87d7533fdd7660369ec5bb8549e107aff562fa477711515eb9c15c9c93312

  • C:\Users\Admin\AppData\Local\Temp\7938.tmp

    Filesize

    324KB

    MD5

    bf9f6045d47dd87ae6d41fc7b5485506

    SHA1

    462184bdd3c143f70ff7e9553966cb3d63b7cd12

    SHA256

    f4cc03a26f2d13a41a86da8629b5d5c80a9ea586b6ba044e952b1972ab013440

    SHA512

    bce57892b7cc2f44dae9eed0113530775f64e16d2846e6f08b10d76b9829e0885a94d816bf84d20ee5751ae3d3c536b6a9e6a75b4f95197d6317b032a839b605

  • C:\Users\Admin\AppData\Local\Temp\cln87CE.tmp

    Filesize

    49KB

    MD5

    abee4387ab69da821ed9397cc651597d

    SHA1

    5d14f4afdbe15448bf884b528ffffab874f920a7

    SHA256

    ac1dfd38d2fa61e28211e196cd3d754f6ccfb220e8c1beba52e54825cf615e22

    SHA512

    e014294cb60b66bd259f4a6ce262fc9eca30a30e7674dae178dbac6132ba464120e5d1076ee81c1210a2f42f819d94373733172cef9fda77c9effb4eed53a904

  • C:\Users\Admin\AppData\Local\Temp\sciter.dll

    Filesize

    5.0MB

    MD5

    9d23e2946b37a886dd9b5ce146cdd280

    SHA1

    ac82352e5ef3988dd53403a9552bf9c4bc5162d3

    SHA256

    9fabfffee8ef815f6e0f34c8909597ddf360ebff061151f18365202b774ceb20

    SHA512

    872951f7ed72422e05e5957ab7bd274fdae2fba465b3177bba4b0dd1f1c7b047d7684977f7ad51fa79dd98b30b30dc6e52eac424798c31ae0e0fe31961b682a5

  • C:\Users\Public\Desktop\Чистилка.lnk

    Filesize

    1KB

    MD5

    08bf2c04b9edabe32534e12598b57815

    SHA1

    0a7fb1637e8e40793058bd62e82b6232fc931613

    SHA256

    e5db9d6dbe6694f5ddafcb804749696c1b6b3e38ab20c034f1fe4539fb77cf65

    SHA512

    535584e1eb91ae6fe553b2d4ba18cf355507938fb8c4e121109408d0bc18b30f9c58c9a19bb00f25ba1f93f48783809635f8cfb3222d6113d44f7244d46bf653

  • C:\WINDOWS\FONTS\PNS.TTF

    Filesize

    127KB

    MD5

    df8c626474a73ab7a8b511655597c7c4

    SHA1

    5de28f387ea88553d195d1978286d43c33231969

    SHA256

    723091ba5a1b8e65164075516d69c00c71225c6dde61ffc32dd4047803ab42b5

    SHA512

    c8f7d1577cb70610c40b96c835faca6b916c4924b5061351c8a67287567556b2014efb7c73cdcc4fb6533829541cd0264b8a9e428d3c572e29c06b0d96633d59

  • memory/4360-57-0x0000000000920000-0x000000000136F000-memory.dmp

    Filesize

    10.3MB