Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:21

General

  • Target

    ea6916462f6f9a2edd5fcea487b2865a_JaffaCakes118.exe

  • Size

    300KB

  • MD5

    ea6916462f6f9a2edd5fcea487b2865a

  • SHA1

    10ada51ff24818e03ff447dc3cc870961eaa116c

  • SHA256

    e50ffb688da66e3d3f6c5089d9c2e5d904eb20d81c71cba9c9212402feca2f40

  • SHA512

    e65f8bcf3f262e42de21be473c5664c2bcca225186cd596253a2a9f80046b3df8d0049b292e373c1ee34028a00835e2726aaf46cefff138911b18704e19d2425

  • SSDEEP

    6144:4fJBNcNm1Sipa7sbuLoDRALJPJRWT+0rSYbdaK4R/lBFyyW9:u391SipaoKgwxRWT3W0pglby

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6916462f6f9a2edd5fcea487b2865a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6916462f6f9a2edd5fcea487b2865a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Local\Temp\vkd32.exe
      "C:\Users\Admin\AppData\Local\Temp\vkd32.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\Systrem.exe
        C:\Windows\system32\Systrem.exe 1
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3376
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\system32\Systrem.exe.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\vkd32.exe

          Filesize

          280KB

          MD5

          597aa3bd0c9fdd42cde18031dff7d907

          SHA1

          7ff920ac79a4121575393d4f97bc01d530d9c3bc

          SHA256

          bb52e1b03cba02140e41946681aa8922a635e3da7587b8fdcbf055adb40fae28

          SHA512

          cf20c192cbc75f32cf2ebadf913484b433756b152445f5a9eb18ec5aca5724ff8d5a4e24459dd73a00a3d39bfcf84ca0a7b254ed47008db7ca1d6ccee5b98661

        • C:\Windows\SysWOW64\Systrem.exe.bat

          Filesize

          127B

          MD5

          51b04c3bbf49bce3a1993b39d0200995

          SHA1

          93d4e3870f7dd03027b1c54af38bd867946f80be

          SHA256

          55450b674c2eb1834541b0936a1b1761946f81056a2ed0a98a1041652b5a0043

          SHA512

          9478f34b4d874c3f1067aba2094ef510f7e23251ad1ef791649b3715aaf63972c931b5cf3d1446848f83f5ea0c7336cda4f0958fa4bff7e7ce7c98b0e2853de7

        • memory/1892-0-0x00007FF8875C5000-0x00007FF8875C6000-memory.dmp

          Filesize

          4KB

        • memory/1892-1-0x00007FF887310000-0x00007FF887CB1000-memory.dmp

          Filesize

          9.6MB

        • memory/1892-2-0x000000001BDD0000-0x000000001C29E000-memory.dmp

          Filesize

          4.8MB

        • memory/1892-3-0x00007FF887310000-0x00007FF887CB1000-memory.dmp

          Filesize

          9.6MB

        • memory/1892-4-0x000000001B800000-0x000000001B89C000-memory.dmp

          Filesize

          624KB

        • memory/1892-5-0x0000000000FA0000-0x0000000000FA8000-memory.dmp

          Filesize

          32KB

        • memory/1892-24-0x00007FF887310000-0x00007FF887CB1000-memory.dmp

          Filesize

          9.6MB

        • memory/1892-25-0x00007FF887310000-0x00007FF887CB1000-memory.dmp

          Filesize

          9.6MB