Analysis

  • max time kernel
    96s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 00:36

General

  • Target

    db8147c277df25be04918bb25776d9b3_JaffaCakes118.msi

  • Size

    384KB

  • MD5

    db8147c277df25be04918bb25776d9b3

  • SHA1

    5786894210952d0e3f46bada4d068fede586ab7a

  • SHA256

    92dc93d00d23934b3ca24ed19ba79d4be9eb2012658b41ed32570a2bb1d86ad8

  • SHA512

    dfbf4d62fd6595132839de9beefc3bbe737fa789d4d4593b528ae3ecb48b0c06d74a86a96a86887e4b734370ba3b2c0822a0cbce79a69d6c369beb517cf3c2cd

  • SSDEEP

    6144:BbZjgS007NNMX/+DoklCAFNWClCA+jp02GmaZ/ZJSEPavLFjt+WN:BbZNNNzbCClCA+jp02GmWhJnav5jUk

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\db8147c277df25be04918bb25776d9b3_JaffaCakes118.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4356
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3984
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2392

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57c092.rbs

      Filesize

      7KB

      MD5

      5aa81583de8d0199e58862a289a5a39d

      SHA1

      c4995f838bc642b957eb2bd1c81f1b1ced2aa69b

      SHA256

      735d6f5ab39b34f35cb6e59d3de1d2fa85001ee94a9ba1e511cd0b4590b40dce

      SHA512

      650cafc935957522e4653ba5cc62fefab896846b4a16651d648960f0057277a5cb7f4ee05151ead3e08a87224d57dee4fdee805feef574b1e8eab7baccfd6dd4

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      d3adcd42f5f0e3dc2e19feabf723ce67

      SHA1

      f2d9149874bc7cb71e011a5710609f6744cf8267

      SHA256

      ea6ff3001ad3d0d6ef8a81a5d0df23435ad6ebe2f5121d6347f05daa0aa722ab

      SHA512

      a912700a7d60dd6986d0fccacaefdf82b91b1333627e2c074685ddc031d83b10ee7c5e8f0da2600964248aa8c052998ac3ab66aa2e5d534306942e878d193cf7

    • \??\Volume{f3a72b53-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{624d38ad-d051-4792-a8e9-3f8ee2ae11f0}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      09c275ce89d44d9de95e37596608ea1e

      SHA1

      4d4ef72f51178a87fb86c85fdd8a06c6fb30e580

      SHA256

      fbebcb36df88efeb249f8d680ed6aca6b92fcbc3c1bb38ae4ed1e977c7ff78f4

      SHA512

      b8a65076ff0846a0c381f7e046d5491d0cf32203c58da606f05f6febf511fad9683dcc5901068072265f0f74825e9e82911cc7d15490d55d986e378ffb0e3854