Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 13:05

General

  • Target

    de53d0db460bf21170e8ec1adc3677f8_JaffaCakes118.exe

  • Size

    401KB

  • MD5

    de53d0db460bf21170e8ec1adc3677f8

  • SHA1

    ae3408fec76913e362b929a5dbacaaa1f60ef488

  • SHA256

    ca7d3c87ec54e6defa7e5ad438bc800c56c2fb8366f0de6797ab88b2c374bbff

  • SHA512

    e7d943a3d0913a6e026aff6ead78469f2ed63cbd8876d919fd4588a8f7fe5ec57c5871c7bca647adee37837947bc22a854b475befc3863266d570c4fac1c5563

  • SSDEEP

    12288:duDu1BX3Yl9kopZPcBV3mqTXGO67L2GxfdfT:du4hoDkopZPsV3msXGO637xp

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 4 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 20 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\de53d0db460bf21170e8ec1adc3677f8_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\de53d0db460bf21170e8ec1adc3677f8_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3404
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
            4⤵
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:3004
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.htm .exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.htm .exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4180
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.htm .exe
            "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.htm .exe"
            4⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3156
            • C:\Windows\SysWOW64\hp-358.exe
              "C:\Windows\system32\hp-358.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1380
              • C:\Windows\SysWOW64\hp-358.exe
                "C:\Windows\SysWOW64\hp-358.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1964
                • C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe
                  "C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2080
                  • C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe
                    "C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe"
                    8⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3656

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome.manifest

            Filesize

            151B

            MD5

            2fa89bb5ec500c62cc40d5a46a6a8cd3

            SHA1

            ab2c5fed92fb203ff7ca8b3353a9e086377afebd

            SHA256

            bbcea744c5edfaf49d50a046051338c2fc75fd12247ae5997b9967fe3f454543

            SHA512

            41299af72f3f78bd1d82423e36272bcde20441254402b5776537de2d5061d125f80f65bbee07bf5d1609003a784f85caf0e4cadbf91782737ea4aa58a0c51e59

          • C:\Program Files (x86)\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome\content\timer.xul

            Filesize

            1KB

            MD5

            8db91883ee3533d23dee7f960f35a86b

            SHA1

            7711e7240614ce19fff8efad065ec4945954a64c

            SHA256

            b6dce1cd85ef55a6887abd3cccd6b644e8ca9b877640feb75d072b9c2f9f46a3

            SHA512

            7c5f5e3d363559a8099a9f94fb80f85272a53f7c92413932b2006f6db1c6b47f58e5767a8ef11bf3b8b370ef8a7d149f3feb95d3c4ef67787bc5466a91044373

          • C:\Program Files (x86)\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\install.rdf

            Filesize

            765B

            MD5

            78ad4864983e69fdc09b56c0cabf8e70

            SHA1

            dbb7c8129472f7d96b069f8a2a9bd117cbf9c5b6

            SHA256

            30e1fc099fdd3eab43a3e390ef120e143bce0befb0dcc3ae05f52590e06ec26a

            SHA512

            10e6708f51f81ac59bb01043acd11ad74a1bb9d52074d32562edfc60a778f3499033515a524d413f1205e2e133e3390cbed34bde6386766fdf7d4eab0dd018da

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.htm .exe

            Filesize

            292KB

            MD5

            61bdeffc0946da743e90dd871abb44b1

            SHA1

            ab476b562b55e86769861d01a291e34d65cbefe0

            SHA256

            1f9a64623275ab45796d8862c6a640cd4eca37108d0d855d38a697b8561d0041

            SHA512

            d3669d4fef76311bbca4cae8d8327b679ac2986f5558d0cc2d560962af46072a025dbfdd21d0057eee10a14c6adba41271df8f84f8da924cccf8129a08780698

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe

            Filesize

            666KB

            MD5

            52390ffcd8dac59cbe89accd5513d7cc

            SHA1

            29acf3219826070c4d667c2d7d4058335d77b4c8

            SHA256

            3cf416cee08191e2f030df18804b450137f427fd752ddfcf875ba77e0d746be1

            SHA512

            f740e51dab7eeb1cec4ccdbf829b13e0d33f63126ce248ddd5e7fddaee6a9ee0a96db877f892ba2e83b4ecd22db516ce7fd425a1c6a8dc8a25f46a9e915a8529

          • C:\Windows\SysWOW64\hp-358.exe

            Filesize

            160KB

            MD5

            28114caa6f505680d673577aedc6834d

            SHA1

            d4ac67e1bfa696bad04d950ea72adfae7a90c5e5

            SHA256

            764d4e44f0c2c11fa6e9df043bd3201bc57ed3da4cce7cc2d8dd366ed67fe402

            SHA512

            75a2569e431f7536137246315444e0e4c24c53ff8a3376b3027168ff024b98f93a618a7007c343a2de90715a90c6bc0d5e9bfa2a6129a8f684cea77e6c253a42

          • memory/1964-57-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/1964-121-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/1964-56-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/1964-54-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/3004-9-0x0000017BEBB80000-0x0000017BEBD06000-memory.dmp

            Filesize

            1.5MB

          • memory/3004-8-0x0000017BD1530000-0x0000017BD1538000-memory.dmp

            Filesize

            32KB

          • memory/3004-7-0x00007FFC337E3000-0x00007FFC337E5000-memory.dmp

            Filesize

            8KB

          • memory/3004-53-0x00007FFC337E3000-0x00007FFC337E5000-memory.dmp

            Filesize

            8KB

          • memory/3156-33-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-27-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-21-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-35-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-45-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-25-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-50-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-29-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-31-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-37-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-39-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-41-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-164-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-161-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-158-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-23-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-19-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-17-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-154-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-152-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-144-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-148-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-149-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-150-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3156-151-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/3656-129-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/3656-130-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/3656-137-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/3656-138-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/3656-139-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB