Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 22:11

General

  • Target

    ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ee863dc8736dd93e2f9caae2b997d3fe

  • SHA1

    05e002b27e64a8c895051c84b791151b7febb0b0

  • SHA256

    98f4f94d0bfff8bceb85c9bbc537b32c33e54036290ef77966dc5f9003f83631

  • SHA512

    5c8778fb4f363a4da6bef37917ea3c76c4d8f2574fa214f3b4df38d30a1a912765ab6871ae65a2119506b050619f86f97bc8e498adc76e178668ff6f3e8c1f23

  • SSDEEP

    768:uD9Wd1N5DLAwnVWEAaUIgKZhdTTgZrBC6v5WU8XOWI:ua1N53XEE3UIgMhdT0Ztf5/8+WI

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe"
      2⤵
      • UAC bypass
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3272
      • C:\ProgramData\wscntfy.exe
        "C:\ProgramData\wscntfy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\ProgramData\wscntfy.exe
          "C:\ProgramData\wscntfy.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1592
      • C:\Program Files (x86)\Common Files\lsmass.exe
        "C:\Program Files (x86)\Common Files\lsmass.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Program Files (x86)\Common Files\lsmass.exe
          "C:\Program Files (x86)\Common Files\lsmass.exe"
          4⤵
          • UAC bypass
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3240
          • C:\Windows\SysWOW64\netsh.exe
            "netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\Common Files\lsmass.exe" name="Windows-Audio Driver" mode=ENABLE scope=ALL profile=ALL
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:5112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wscntfy.exe

    Filesize

    1.1MB

    MD5

    ee863dc8736dd93e2f9caae2b997d3fe

    SHA1

    05e002b27e64a8c895051c84b791151b7febb0b0

    SHA256

    98f4f94d0bfff8bceb85c9bbc537b32c33e54036290ef77966dc5f9003f83631

    SHA512

    5c8778fb4f363a4da6bef37917ea3c76c4d8f2574fa214f3b4df38d30a1a912765ab6871ae65a2119506b050619f86f97bc8e498adc76e178668ff6f3e8c1f23

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe.log

    Filesize

    128B

    MD5

    a5dcc7c9c08af7dddd82be5b036a4416

    SHA1

    4f998ca1526d199e355ffb435bae111a2779b994

    SHA256

    e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5

    SHA512

    56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

  • memory/1940-1-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/1940-2-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/1940-6-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/1940-0-0x0000000075162000-0x0000000075163000-memory.dmp

    Filesize

    4KB

  • memory/1972-46-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-35-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/2364-34-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/2364-30-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/2364-45-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/3272-8-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/3272-7-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/3272-37-0x0000000075160000-0x0000000075711000-memory.dmp

    Filesize

    5.7MB

  • memory/3272-3-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB