Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 01:41

General

  • Target

    f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe

  • Size

    795KB

  • MD5

    f4e56e9d5dc66cc15930abbdca5c8c8b

  • SHA1

    aa00952206545af5bd8d0890bf0c7802c08c830a

  • SHA256

    a424ecaea26cb2393afaafe05ca451ed818806de04fcd398ea99037a5de85bcd

  • SHA512

    8f6c245daae860262d2326c37b8ff524faecf8330bcd784fc55e9af06be5151504dfb52510e3e71054acc008b819f9107a0f124609a74726c77bbefeacb66530

  • SSDEEP

    24576:9Mw6ce/U26Cb5KaXKseD0nye08WIcshV/8+v:BI/U26CNZX9ektDhK+v

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Public\Downloads\Norton\{NIS19113-SHPD-FSD21017}\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe
      C:\Users\Public\Downloads\Norton\{NIS19113-SHPD-FSD21017}\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe /r
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Norton\FSDErMgt\ErrMgmt\SQCLIENT.dat

    Filesize

    3KB

    MD5

    16e0cfc376b78bfdf0b7e7e303eec1bf

    SHA1

    306c30b697c7c380bc778d64e7eefada1cac7dd1

    SHA256

    9c01ff75101d80a7d17465f052ace4e0fd57f97f5d17763dc6a587c3e4748416

    SHA512

    7bbd85303921b1772353ee5a2d6f0f882eedf27fe4f068cec7ec79b1da7145add9065e9e5b52b261265234eb4c81bcb23e1a03fcb39495bafad344a39fe2b24f

  • C:\ProgramData\Norton\FSDUI-2024-09-25-01h41m55s.log

    Filesize

    1KB

    MD5

    4a93df74761a52fef314fa95576fc447

    SHA1

    c7c0caa494a57d86d8d1534a654310e0eef25780

    SHA256

    d3f67baf12ce1782a5e3ef7aa95bcba60d6dca94c35b3e495f8c12a447b6c172

    SHA512

    6bdf700ad0d87c9b57fa40171e64f69b2884be50f6f8c64af4a501fa5fbb16faa30377a76567ac88db3ff2fa5e1eb03ff6305a3839944235ab8d2756d46d62bd

  • C:\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\LC.INI

    Filesize

    157B

    MD5

    41eda292f851ff37e38b841bdc9a3c44

    SHA1

    ce46fd8c8100b84e9423d266d034048d8a67cb4c

    SHA256

    63811ed80f0a94607913e9dc2bb9dc3fb5d7f601da9a579be8cb229656f67596

    SHA512

    dacb7eae5bbe46119ce104c6ced233f1065de0c823cdf577d8ba72fdd24913f548699d2070c01a8da7af0a287396904548dcd4aee0fed39f3286d392a2790c6d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2392887640-1187051047-2909758433-1000\4bd07e1ba952c6aa9bf83a8d98c08949_c186ecc3-67e4-4d2b-8682-b6c322da87aa

    Filesize

    54B

    MD5

    9499c2f308410e48386f58ca7afccd2e

    SHA1

    e2ef9dec757aec938d801dd720fddc0c387da7af

    SHA256

    87e4fc1f82d5a89c7f10ca58cf5de66d184cc3ce02954a13ade3100414a3bc97

    SHA512

    ff68637e2b3b62cf6ca812bf4d067606edacb353825628048396c45e9be8ca7725c93787b8bcf82e610cf795f69a52b20d4ac48ade5405b114643af6515cf457

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Norton\Norton Download Manager.lnk

    Filesize

    1KB

    MD5

    66f487fa0dd43649be6cd925a187c73b

    SHA1

    49865d124e76f8b6b8556827c1f5285f6a3f42a5

    SHA256

    a37e89834fdbbfac1e6f16bb463bc7dd2416d8cf8f9366b7b198f1ad0722d4d6

    SHA512

    50564cf8a7ed055400c0a90d22e10e676c6544b9e5f198853f55a2ca53a45ad75134450cdf12b04420c6a3754356c7daad561fb358c9a4157ff1d6830c5dfd42

  • C:\Users\Admin\Desktop\Norton Installation Files.lnk

    Filesize

    1KB

    MD5

    a6e194a7e4667b8f916116e9e6e5c4ab

    SHA1

    0729c41e8dc2706fb71878533e05d05d52481711

    SHA256

    c733a704928575869002a40bc57b94599711a3b12c2e61993870f728d2bf514c

    SHA512

    f34f676f6493952240d60989a04a0e070189ce9a57d5c835e5b8be548f28558bc78624617c7b50fd3d75e7f63a9816facc44ee89dae7deb46919ed3a8d350a7e

  • C:\Users\Public\Downloads\Norton\{NIS19113-SHPD-FSD21017}\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe

    Filesize

    795KB

    MD5

    f4e56e9d5dc66cc15930abbdca5c8c8b

    SHA1

    aa00952206545af5bd8d0890bf0c7802c08c830a

    SHA256

    a424ecaea26cb2393afaafe05ca451ed818806de04fcd398ea99037a5de85bcd

    SHA512

    8f6c245daae860262d2326c37b8ff524faecf8330bcd784fc55e9af06be5151504dfb52510e3e71054acc008b819f9107a0f124609a74726c77bbefeacb66530

  • memory/1728-25-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1728-0-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1728-1-0x00000000006D0000-0x00000000006D2000-memory.dmp

    Filesize

    8KB

  • memory/3788-26-0x00000000006E0000-0x00000000006E2000-memory.dmp

    Filesize

    8KB

  • memory/3788-38-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/3788-49-0x00000000006E0000-0x00000000006E2000-memory.dmp

    Filesize

    8KB

  • memory/3788-51-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/3788-50-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/3788-52-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/3788-70-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB