Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 00:53

General

  • Target

    ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118.exe

  • Size

    576KB

  • MD5

    ec84d2f90193a2217ed2ccd2feec9d4b

  • SHA1

    907e912ecf8e741b6ef6bcf190d157c4b52f1994

  • SHA256

    0a8a9b0025e81b6188a01e87638c65d0d7da274a13e8b3c678f0398f3c7e8331

  • SHA512

    e96762edac1f78603c88a31a83334165fcd229aa5e320e93f29833fb6c3e7c0fe0009bdf330db45015585ab6cfc38edceeabeb4598c76595cf37282afbe52a7d

  • SSDEEP

    6144:A1QMivgpQ25+yApTCg3cz6ufWeLuIrybTQg9o214QTB2I/51pftDKHpDbU69SWvT:wQMiG+2gef5x/xQTB2OfDKC7Wgcxp

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 30 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 60 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Users\Admin\AppData\Local\Temp\hnsqubwcrxc.exe
      "C:\Users\Admin\AppData\Local\Temp\hnsqubwcrxc.exe" "c:\users\admin\appdata\local\temp\ec84d2f90193a2217ed2ccd2feec9d4b_jaffacakes118.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\celmx.exe
        "C:\Users\Admin\AppData\Local\Temp\celmx.exe" "-C:\Users\Admin\AppData\Local\Temp\zmeqmbrfxiqbloxj.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:4608
      • C:\Users\Admin\AppData\Local\Temp\celmx.exe
        "C:\Users\Admin\AppData\Local\Temp\celmx.exe" "-C:\Users\Admin\AppData\Local\Temp\zmeqmbrfxiqbloxj.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:3608
    • C:\Users\Admin\AppData\Local\Temp\hnsqubwcrxc.exe
      "C:\Users\Admin\AppData\Local\Temp\hnsqubwcrxc.exe" "c:\users\admin\appdata\local\temp\ec84d2f90193a2217ed2ccd2feec9d4b_jaffacakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    6ba6bc14f4adcffbea99c64f298b8e01

    SHA1

    e2381b178d4738726fd2b94ab604b0d101d33733

    SHA256

    65bf670f2312b827f17d15a091af7f47b48a33220486e57b08b4384cd84b4d06

    SHA512

    8aec02f486a5656fdfb8ae9009092546e59fd4829b90b5f7537ff8c4a7eeaa4b4c57406635ba170cfbf29cc3eafb46303b06930457adf317660ebf78a8c054e9

  • C:\Program Files (x86)\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    7fec11c611d0698371dc403d19eb01e3

    SHA1

    51bd500349a07e866b16b4efe198b7aec64f3cbc

    SHA256

    557d76ff6080e2c6cffb667836c58a2b97d14cdc62b27298ecdcdabb7fc3e484

    SHA512

    cf8bc10a91ec183ad58b8ff34dbdab0e8acb4e9c631ba554b011575428ba0962b6e45f98f8ea76410a1e5df4bd90242995ec3b4f682f21f52e6741effb02e9d8

  • C:\Program Files (x86)\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    e44c24307531169970b8f29336587afe

    SHA1

    0a9c41193db0dde9363376dd57fa666dc72164bd

    SHA256

    c2387c8572fd9e6255e0a152113f61e3fc790a6b25c38adccb5cbdab483970ca

    SHA512

    fb61239b73fa96b5b1dbc0c3be5fa264b054806ab88c412f0dab9058e0c9b1b613442c9e5e1f1c762b34726fce58c620cbb8e4a83eea69090cd1ab0467c82655

  • C:\Program Files (x86)\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    f6006ccfffb1677981b387c17e953a03

    SHA1

    d4ce824e004a5462224cdae8bf5e209d18092c4e

    SHA256

    c47e17b4071192e8e7adfc428b0e43af17193523973a96d6b80046894c50eba9

    SHA512

    1e008cdedabb388e2c940f64a54bb8af0c09ba6aee3ad703815714bde42a4a9792fcb1d01b47d9c15be372856d790f4f15bc21797646398e4413e84a4c57ee99

  • C:\Program Files (x86)\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    9031028f550348ce3b7f67856cb122c2

    SHA1

    0a1c0acc1f5ebeebf171e681ef5ed92f5505fe3f

    SHA256

    287358da958bd0f61148b7076901a23ff45530b2fcd30897bfe6a877438a4109

    SHA512

    341d8b783468dd37f8d7ca4546452352f1b3ca6cb062a64ac2bdc21c4d712806eed571de6e8f126da70958ca681025ee34f09a7b3bc82b3548c7a10281c63f48

  • C:\Users\Admin\AppData\Local\Temp\celmx.exe

    Filesize

    708KB

    MD5

    31cd2776b43bd934d20363f8abd11dd9

    SHA1

    e17f2f9e730005e1042f352488639db87a3440ab

    SHA256

    99544c695628e6ed8b8cc63cbc1af1bdb0e5a38a81362cdd3801b2121415b2fb

    SHA512

    87153797cd14a0717e5e2151b912552bbc758e7e32bb1c91177ddc3c5172bd10f32de227b2bff1bdbf57dc6b33e0fdd231396417ca7cd619ddca92a70e213424

  • C:\Users\Admin\AppData\Local\Temp\hnsqubwcrxc.exe

    Filesize

    320KB

    MD5

    304415df6ad55a90301aa8158e5e3582

    SHA1

    cc20ee7d5e8607f4fa0633093083ec0a68dcf3cd

    SHA256

    34a5f9e2b494b086abad2721019be271fa43350c9146f000e50fe554f170743d

    SHA512

    4ef2a9a8a3b36ba8c40a0bda9de415c76f985da34475f9110f7fe7b70a8e235d66ec6e15f76b45c5f75f5594fe05051d8112745e5031a18c817bd5d86212c687

  • C:\Users\Admin\AppData\Local\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    f5cdb0b0c702d8b38bebf1dd3549e5dc

    SHA1

    c621943ded5bb8cd2c657070da27f9912f26c6f2

    SHA256

    238be47ac29ae6cb9ea534bbe99e5b5dd0901a7da583aa94453693bd6f4bb7e2

    SHA512

    9b69c06120ba5f40fa3d7e5f4c9dadef7a11599ebbdff632a2ec6ea75fb2c2038bf9e126864080788b3b40c2cbc51f440ec2297086ddee1db755849ec2d96b24

  • C:\Users\Admin\AppData\Local\dacyeddbdyqlfslhrmdacy.ddb

    Filesize

    260B

    MD5

    a84ce7fec05e56c420cdcb2cd8b0d17d

    SHA1

    c530fc2abcfea8c8a268885ea3067ef99139b36c

    SHA256

    1d20ed99bc4da3afca017b15abba1024517605ed9f9f396470534d1c2e995805

    SHA512

    eb6c19103664623f24f2b21f2537e99c8dd4c5e9c1fe7a95a2b4fc4eb08c362df78ec302d3d5ce7ae8b7a5c3caa7f13d6667fa13cb29c6f2bd668afe4a18058c

  • C:\Users\Admin\AppData\Local\ucpwnxirekntywahciksfmdnyhuadjomq.sya

    Filesize

    3KB

    MD5

    8805e4860a8a2aa0f52784f731c4ec89

    SHA1

    2b466a88670bbd2226d66bf34f441ef6ad3b3886

    SHA256

    6c6f488c964727f26a22852d26ee8e822cce9dc99a4ceb4c4a06d015717cf148

    SHA512

    90e0edfd7bda7b8430497bdba8f5f66850bdeee40150e0a9b8466da0eeeecb7a01cbed2f1b4fd094a2b0392fd94448be4816bf3c97215c19040320d506817823

  • C:\Windows\SysWOW64\peymkbtjdqanzepdfs.exe

    Filesize

    576KB

    MD5

    ec84d2f90193a2217ed2ccd2feec9d4b

    SHA1

    907e912ecf8e741b6ef6bcf190d157c4b52f1994

    SHA256

    0a8a9b0025e81b6188a01e87638c65d0d7da274a13e8b3c678f0398f3c7e8331

    SHA512

    e96762edac1f78603c88a31a83334165fcd229aa5e320e93f29833fb6c3e7c0fe0009bdf330db45015585ab6cfc38edceeabeb4598c76595cf37282afbe52a7d