Analysis

  • max time kernel
    150s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 06:02

General

  • Target

    ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    ef31db485b286c40abef2665b9c1a367

  • SHA1

    e827428f5605104003f3e2dd35f959b22946ae65

  • SHA256

    bf5544a581a28a9d087e1433942c5f7d795159e94b6bbd57e123d12ca9efef7c

  • SHA512

    ddd1c7205b8fddb59b50467df8ca1ca427a49df83bd5b86ba241e653c873ccf71edba437ae9dce476dedc1abe04412d07778315186982b236df57f0f015f40cd

  • SSDEEP

    3072:KRauDEef20RIcdaDTdj1ShUxu22K87UdEPf66u/yMr:TuD/uh1Shaf277UO66uN

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Windows\SysWOW64\Rundll32.exe
      Rundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\driver.inf
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Windows\SysWOW64\runonce.exe
        "C:\Windows\system32\runonce.exe" -r
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\SysWOW64\grpconv.exe
          "C:\Windows\System32\grpconv.exe" -o
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1356
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe -sysrun
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3716
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\QMftQA73.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\QMftQA73.bat

    Filesize

    218B

    MD5

    98f14f8ca35b5480969efb704f5f3be6

    SHA1

    14ffdb1292f0d7bdb02e83d7ceab96b20cafc95b

    SHA256

    79783a33f5fc554990692d3a348bf14204261d61f7c81e725b114b2dbb1a0df7

    SHA512

    3bfa66d9f55c601ff2bbd210aafc37083084265c646a05a44dba9e3a8bb80c2be9bae37cdbd7204b27a6d7277d92267b6706e5a9c14a266f29686788511a8457

  • C:\Users\Admin\AppData\Roaming\driver.inf

    Filesize

    412B

    MD5

    56b521a68a5b98cc830de8ab0cbb48b9

    SHA1

    336c2b765a93c69ee55333fb249ec563c03dac40

    SHA256

    ef827ec876517a13b5e23fc2e60e75bf68ec28c7126167d2c6df873ca9fb622b

    SHA512

    fee995c76ec5c4a2bd0a6ff0fd983dcf69755a191394d1524e2969a22c725522cc9f19b64193d90fb8a4a4d5d4a79d03f110f45bf8c8b043cfd56a7f8b00d6a9

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    136KB

    MD5

    ef31db485b286c40abef2665b9c1a367

    SHA1

    e827428f5605104003f3e2dd35f959b22946ae65

    SHA256

    bf5544a581a28a9d087e1433942c5f7d795159e94b6bbd57e123d12ca9efef7c

    SHA512

    ddd1c7205b8fddb59b50467df8ca1ca427a49df83bd5b86ba241e653c873ccf71edba437ae9dce476dedc1abe04412d07778315186982b236df57f0f015f40cd

  • memory/3716-29-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3716-17-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4040-4-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4040-3-0x0000000000401000-0x0000000000417000-memory.dmp

    Filesize

    88KB

  • memory/4040-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4040-2-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4040-24-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4040-25-0x00000000021C0000-0x00000000021EC000-memory.dmp

    Filesize

    176KB

  • memory/4040-26-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4040-1-0x00000000021C0000-0x00000000021EC000-memory.dmp

    Filesize

    176KB