Analysis

  • max time kernel
    92s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 13:49

General

  • Target

    edb95a936ed95ace10d87d8e477214b8_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    edb95a936ed95ace10d87d8e477214b8

  • SHA1

    feb09d6479dd6b3471b73017c9c1a602f910e635

  • SHA256

    452ccf9918e1816991e52b062ba4cf9ae5e0fefa9e730aaa788c310a69c6eef5

  • SHA512

    56e0d00bf512b1a4f05b13a59af48397062b397736dde9a2d44b44ac3e23f657f6ade032e0100be549937557c11319f8536f838867af9c3053be0ac1329c622e

  • SSDEEP

    49152:CSz6jyaZyamb35yQpx9kpxWHM8My2x1WN4xo+A8G2fQEAvnqyLvESlvj:1qsB35yCx2UjMy8152+q2feHDl7

Malware Config

Signatures

  • Windows security bypass 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edb95a936ed95ace10d87d8e477214b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edb95a936ed95ace10d87d8e477214b8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\AppData\Local\Temp\lol1.exe
      "C:\Users\Admin\AppData\Local\Temp\lol1.exe"
      2⤵
      • Windows security bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Executes dropped EXE
        PID:2264
    • C:\Users\Admin\AppData\Local\Temp\lol2.exe
      "C:\Users\Admin\AppData\Local\Temp\lol2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lol1.exe

    Filesize

    754KB

    MD5

    b335567f84ffbb94b6a0c6e8263dfc68

    SHA1

    8b792b953ac1e9b9be88261a0c2d5b6448f38af8

    SHA256

    dd7d28e6e462f587f47df840e80a854d5ff6e609df7bbcb9c33c1e7d62a5b8ec

    SHA512

    9e8641ebe25aad605827821305ba9705be1b036baa37e54842a7a350c194a723fda5f80057e499f8399aadbfc8e3ec63a521b8bbecda2760aff64d1e8ade2f2b

  • C:\Users\Admin\AppData\Local\Temp\lol2.exe

    Filesize

    1.3MB

    MD5

    c43543b7681c8437fce564f62a351f28

    SHA1

    a0741180fd672919164bb6339fb2b0ae5cd8e0e6

    SHA256

    ab23bd92c0323ab8aed8729e1b7b6f30aa436481f9b72f0aa3e769b96db66aab

    SHA512

    b8eda571b6f2dda59c31d15bddb799ff0172d4cfb3079ea357a56f3ec71e3b3ccf1277821e68ee0d51ec75acfad397172912114a5f8b679e4fa067cee930ed72

  • C:\Windows\SysWOW64\svchost.exe

    Filesize

    45KB

    MD5

    b7c999040d80e5bf87886d70d992c51e

    SHA1

    a8ed9a51cc14ccf99b670e60ebbc110756504929

    SHA256

    5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

    SHA512

    71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

  • memory/636-22-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

  • memory/4576-0-0x00007FF8748D5000-0x00007FF8748D6000-memory.dmp

    Filesize

    4KB

  • memory/4576-1-0x000000001C170000-0x000000001C216000-memory.dmp

    Filesize

    664KB

  • memory/4576-2-0x00007FF874620000-0x00007FF874FC1000-memory.dmp

    Filesize

    9.6MB

  • memory/4576-5-0x00007FF874620000-0x00007FF874FC1000-memory.dmp

    Filesize

    9.6MB

  • memory/4576-21-0x00007FF874620000-0x00007FF874FC1000-memory.dmp

    Filesize

    9.6MB