Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 07:15

General

  • Target

    ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe

  • Size

    292KB

  • MD5

    ed160a55ecc41b99343ddc8b5cc9e8c3

  • SHA1

    db1170f85a098fd064116e3058a63a4e8ffb6f85

  • SHA256

    15b5733f69e263c6f53cad255c2f51add730968a04dc53a0fbc417ccaeee5234

  • SHA512

    7eb71f24dfe52b1432612974093cc37f44bf8a3f6bd08e03208540521569663fd4129453443fa72e5cfb0742e8f7139c29bab6301bec9534a3cea99cc80be51e

  • SSDEEP

    6144:OUKww65rAi1mVfURzQlVqVz/pkME1gkNG7Lns2O:OUKzqB1mVfaMahBkTG7Q2O

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe
      2⤵
      • Modifies firewall policy service
      • Checks computer location settings
      • Maps connected drives based on registry
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\System32\net.exe" stop sharedaccess
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop sharedaccess
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4272
      • C:\Users\Admin\AppData\Local\Temp\ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe
        ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:636
        • C:\Users\Admin\AppData\Roaming\Commn.exe
          "C:\Users\Admin\AppData\Roaming\Commn.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:920
          • C:\Users\Admin\AppData\Roaming\Commn.exe
            C:\Users\Admin\AppData\Roaming\Commn.exe
            5⤵
            • Modifies firewall policy service
            • Checks computer location settings
            • Executes dropped EXE
            • Maps connected drives based on registry
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\System32\net.exe" stop sharedaccess
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2288
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop sharedaccess
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2652
            • C:\Users\Admin\AppData\Roaming\Commn.exe
              Commn
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2440
              • C:\Windows\SysWOW64\svchost.exe
                "svchost.exe" "C:\Users\Admin\AppData\Roaming\Commn.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3460
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4408,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:8
    1⤵
      PID:5500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Commn.exe

      Filesize

      292KB

      MD5

      ed160a55ecc41b99343ddc8b5cc9e8c3

      SHA1

      db1170f85a098fd064116e3058a63a4e8ffb6f85

      SHA256

      15b5733f69e263c6f53cad255c2f51add730968a04dc53a0fbc417ccaeee5234

      SHA512

      7eb71f24dfe52b1432612974093cc37f44bf8a3f6bd08e03208540521569663fd4129453443fa72e5cfb0742e8f7139c29bab6301bec9534a3cea99cc80be51e

    • memory/636-701-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-703-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-699-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-698-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-706-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-704-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-708-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-721-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/636-707-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2440-1448-0x0000000010410000-0x0000000010438000-memory.dmp

      Filesize

      160KB

    • memory/2768-1447-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/2768-1112-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/3460-1450-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/3460-1449-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/4808-379-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4808-375-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4808-712-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4808-373-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4808-376-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4808-378-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB