Analysis

  • max time kernel
    148s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 12:23

General

  • Target

    e02ce999fdf66035d7cdbdc19585eff0_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    e02ce999fdf66035d7cdbdc19585eff0

  • SHA1

    886ba82210574979bbd070a3b5279589b9fd8772

  • SHA256

    8d6524aff6a6eba7663282eff6e7aa6313e041b49033852faecb71492ff04cc6

  • SHA512

    8084dcde12c3b150dae09abc4a30ced5212e0cc647a7d7276463253dce88555ee11171ee2bf6e73558447f52758c15d487fd47749741c4912238747ff7bd0ed1

  • SSDEEP

    1536:PaRW+D2q3FQf2kvdMiCei1JRN3AfsB73lL0841nn0c+po6BZXKuaiM:PSW+6f2kvjCeiLR1AEB73lL08S0faMk3

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Remote Services: SMB/Windows Admin Shares 1 TTPs 2 IoCs

    Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 48 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e02ce999fdf66035d7cdbdc19585eff0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e02ce999fdf66035d7cdbdc19585eff0_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2280
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\e02ce999fdf66035d7cdbdc19585eff0_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4456
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:4312
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
    1⤵
    • Enumerates connected drives
    • Remote Services: SMB/Windows Admin Shares
    • Suspicious use of AdjustPrivilegeToken
    PID:4060
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
    1⤵
      PID:4296
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
      1⤵
        PID:3168
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
        1⤵
        • Modifies data under HKEY_USERS
        PID:4368
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
        1⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        PID:4352
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
        1⤵
          PID:4692
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
          1⤵
          • Enumerates connected drives
          • Remote Services: SMB/Windows Admin Shares
          PID:3676

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        2
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Active Setup

        1
        T1547.014

        Privilege Escalation

        Boot or Logon Autostart Execution

        2
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Active Setup

        1
        T1547.014

        Defense Evasion

        Modify Registry

        2
        T1112

        Indicator Removal

        1
        T1070

        File Deletion

        1
        T1070.004

        Discovery

        Query Registry

        2
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        2
        T1082

        System Location Discovery

        1
        T1614

        System Language Discovery

        1
        T1614.001

        Lateral Movement

        Remote Services

        1
        T1021

        SMB/Windows Admin Shares

        1
        T1021.002

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Windows\AppRepository\StateRepository-Deployment.srd
          Filesize

          3.0MB

          MD5

          cbda55dcc4be08631604f07ea6ddda42

          SHA1

          36512056bbbd2530c14f5ee3b59d404548aa942a

          SHA256

          ca4a8c7011fb0f91b7acf2b3362a960f75e5436dc55fe76a5d4c354be2dc21b2

          SHA512

          22ed1726e2902f6d107b30167d410c7d36ee47a8474e2fd6f685c4f0c2c69d875ac897c0a67fbcaa5c173eb00d5c198c8e127b8d2b5ebbba2e0564ecb5954356

        • C:\ProgramData\Microsoft\Windows\AppRepository\StateRepository-Deployment.srd-wal
          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_5E65FCDD03110BA05402E762877D780E
          Filesize

          510B

          MD5

          a47c0dec71cd1aa0b21f34428ae4b4e0

          SHA1

          209327a7b558d79fb69014185c41ec62682e63a5

          SHA256

          c8699ee007a2bd04aa678897c4310d5fa5278e10332cd266b41a414988868cd1

          SHA512

          a77bdd57e40a22527e51095de2d702fe76eba2b550556b39746765df98ed21ce6e99acb2027c7e073491c8400df6e8584affbf1b5a88b875c213e7317a813824

        • C:\Windows\SysWOW64\mscabo.com
          Filesize

          76KB

          MD5

          e02ce999fdf66035d7cdbdc19585eff0

          SHA1

          886ba82210574979bbd070a3b5279589b9fd8772

          SHA256

          8d6524aff6a6eba7663282eff6e7aa6313e041b49033852faecb71492ff04cc6

          SHA512

          8084dcde12c3b150dae09abc4a30ced5212e0cc647a7d7276463253dce88555ee11171ee2bf6e73558447f52758c15d487fd47749741c4912238747ff7bd0ed1

        • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
          Filesize

          338B

          MD5

          d7ef2fa7110279cf5e7fa0f07d48252c

          SHA1

          d3291ed5d0ad5a19d98dd997ab6c39d79764b677

          SHA256

          73c7ce8000d57bf3a28cfbd2202c5fdbe4cb52d14c51c582cb717e0c01eefe62

          SHA512

          5a757303439ba6feb677689b7919a0e17dcdb482f48a1635f1d0f8d8fb1699e3246f8a5809716a6fa792519eb2b32878b769d7c40aaea582a83ab2e33860093d

        • memory/2280-55-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-52-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-60-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-62-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-68-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-69-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-72-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-73-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/2280-75-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/3372-30-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/4312-2-0x0000016C74370000-0x0000016C74380000-memory.dmp
          Filesize

          64KB

        • memory/4312-8-0x0000016C743D0000-0x0000016C743E0000-memory.dmp
          Filesize

          64KB