Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 09:22

General

  • Target

    ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe

  • Size

    712KB

  • MD5

    ef7e3f05d33a5b9befd1e0615fad4489

  • SHA1

    310563f052e4ce5f92e8b655cf04444a8c056506

  • SHA256

    08796b1df82dd1cad1cb9470562c6fe97a5b682d8f79bda6bf3645cb168e57b3

  • SHA512

    00f1b96fe40bd20894080cc2720d8178f59a12031830209f94c3a31fd6f78f9e6e6aa1725dc59d47d46d3962cbc1eebb9a9905c1e1e23def27888a4325f2d956

  • SSDEEP

    12288:Ggji3IoVKpBtmz1P+fNNZHCRInBZqpzUF4AnjZnMei/SFfdYTQu2zwwGaJ:XyIo0tmZPwzFqtURjZnli5k3zwcJ

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 18 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Users\Admin\AppData\Local\Temp\ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2788
      • C:\Users\Admin\AppData\Roaming\lsass.exe
        "C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3140
        • C:\Users\Admin\AppData\Roaming\lsass.exe
          "C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\ef7e3f05d33a5b9befd1e0615fad4489_JaffaCakes118.exe
          4⤵
          • Modifies WinLogon for persistence
          • Checks BIOS information in registry
          • Deletes itself
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\TEMP:1A3830B1

    Filesize

    120B

    MD5

    f9e428f3acc1de4d2def5079c8b22c8e

    SHA1

    8305d34d3c10796e1185267dbdc1a7dcdebd632f

    SHA256

    6e6a86240e25aab256a69ff4b78ec22354d40974e3d3b510ac84ca2f14be481b

    SHA512

    409213128af16cf712796dc302962490388a6d16a6b8bfb848460456b4ae5136aa262e0d6619040ba3c1cf199f980f6d41c3a0e3c222c9ce5932ef17057402d8

  • C:\Users\Admin\AppData\Roaming\lsass.exe

    Filesize

    712KB

    MD5

    73f9995491dea368e7aff99b1ba0e116

    SHA1

    583335c208d7bf9c10b1bb0404e80e6df815b973

    SHA256

    d5409e08529f52c7804d85a31ceb82568b8085bd781893c8314dccf6d29fa701

    SHA512

    afa41b43bfa84dc52b0628a3f865a4b8c94f977297afd1fec562da1388b52a7578c268f9d616e9c0f5f55f27a54f7306dc14f22cfdf3df81391ac1b7ae2613b9

  • memory/428-43-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/428-0-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/3140-46-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/3636-39-0x0000000002420000-0x00000000024B4000-memory.dmp

    Filesize

    592KB

  • memory/3636-33-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/3636-36-0x0000000002420000-0x00000000024B4000-memory.dmp

    Filesize

    592KB

  • memory/3636-34-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/3636-35-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/3636-26-0x0000000002420000-0x00000000024B4000-memory.dmp

    Filesize

    592KB

  • memory/4404-12-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/4404-11-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/4404-16-0x00000000021A0000-0x0000000002234000-memory.dmp

    Filesize

    592KB

  • memory/4404-13-0x00000000021A0000-0x0000000002234000-memory.dmp

    Filesize

    592KB

  • memory/4404-10-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/4404-9-0x00000000021A0000-0x0000000002234000-memory.dmp

    Filesize

    592KB

  • memory/4404-42-0x00000000021A0000-0x0000000002234000-memory.dmp

    Filesize

    592KB

  • memory/4404-4-0x00000000021A0000-0x0000000002234000-memory.dmp

    Filesize

    592KB

  • memory/4404-45-0x00000000021A0000-0x0000000002234000-memory.dmp

    Filesize

    592KB

  • memory/4404-2-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB