Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 13:50

General

  • Target

    f625bcd900ae638e2b4a214a0b947583_JaffaCakes118.exe

  • Size

    420KB

  • MD5

    f625bcd900ae638e2b4a214a0b947583

  • SHA1

    b99d09e0302d52ccee43dad6046f483e4f6b6cec

  • SHA256

    13cad83fe213749156322b16605faa5aa470f738b802fa140dad8d3d8f357dac

  • SHA512

    b3095eaa894f2b05e4a627e520431b5581f352967941fc2d7f48bc0b4e0deec895e5c5e287bafc0029c62b4979617d12e4be8ca2cffaf8b1326fdf803781a1a7

  • SSDEEP

    6144:wsxFYtnMDXw2Xa5eWLuN/cCnVIjVo3N019HvAFWncJSaTWyYGrxctu5j:pFYtoDXSexUCnVGIg5bncJeGrjj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f625bcd900ae638e2b4a214a0b947583_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f625bcd900ae638e2b4a214a0b947583_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC csproduct Get UUID /FORMAT:textvaluelist.xsl
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2296
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC bios Get SerialNumber /FORMAT:textvaluelist.xsl
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3740
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC bios Get Version /FORMAT:textvaluelist.xsl
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3660
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC csproduct Get Name /FORMAT:textvaluelist.xsl
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4832
    • C:\Users\Admin\AppData\Local\Temp\nsu2AC6.tmp\7za.exe
      7za.exe e -y -p"79de5ffcfee74ea9f93a86eb12312ed6" [RANDOM_STRING].7z
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4108
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3980,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:8
    1⤵
      PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsu2AC6.tmp\7za.exe

      Filesize

      574KB

      MD5

      42badc1d2f03a8b1e4875740d3d49336

      SHA1

      cee178da1fb05f99af7a3547093122893bd1eb46

      SHA256

      c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

      SHA512

      6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

    • C:\Users\Admin\AppData\Local\Temp\nsu2AC6.tmp\[RANDOM_STRING].7z

      Filesize

      225KB

      MD5

      d12040af59b2509ab0514c4abba81bc6

      SHA1

      3b9496c3562a68222f137943950b498bce5cb8e6

      SHA256

      6354ce4fa466a3c91af022a73910d8214332e7861cdbef215feb0572f304171b

      SHA512

      4f0ad19a2f05f6b58a490d86309e5e60a4d24286fce75fcb00ffc258b35b474115bae2a9b79fca2a5a80111adf4d3955f53de32baa843e6413a32141698e043e

    • C:\Users\Admin\AppData\Local\Temp\nsu2AC6.tmp\install38860.exe

      Filesize

      193KB

      MD5

      10bd2af1b07ec6bc9cd17ba512569e59

      SHA1

      807e17ab1b98177e135d30941b45081960d1e866

      SHA256

      9c620ef6eac3d0d9d3f6f2622a53d1f543cebd93846636ba397683962c07fc7c

      SHA512

      deacd041f12b6ec74f9e4488874ce962037990ed0ae424aaeabf2c35876b2ebbb943f92e9a4ffe504718bb00021209b035439ea4d7c64a4031b86ce9104ce3ed

    • C:\Users\Admin\AppData\Local\Temp\nsu2AC6.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      acc2b699edfea5bf5aae45aba3a41e96

      SHA1

      d2accf4d494e43ceb2cff69abe4dd17147d29cc2

      SHA256

      168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

      SHA512

      e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe