Analysis

  • max time kernel
    93s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 20:10

General

  • Target

    f6c6b4d83cfffbfea44b65d4315d05c0_JaffaCakes118.msi

  • Size

    384KB

  • MD5

    f6c6b4d83cfffbfea44b65d4315d05c0

  • SHA1

    acefb1b80fd058488207cb3898ce61c37ddcc808

  • SHA256

    f41313345680edbd1bf0666e8233ba0436a13ecf6c3ab98606580099748b415b

  • SHA512

    b8864d3e6d505eac17403e330f3cfbde648bcc4cda07d5fc5f3c1af8ff66a2f7c2601e8e422eb171f3117494644fc54362156891b313d406ffb5c153091c5fa8

  • SSDEEP

    6144:BbZjgS007NNMX/+DoklCAFNWClCA+jp02GmaZ/ZJSEPavLFjt+Wk:BbZNNNzbCClCA+jp02GmWhJnav5jUX

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f6c6b4d83cfffbfea44b65d4315d05c0_JaffaCakes118.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:524
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2688
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57d041.rbs

      Filesize

      7KB

      MD5

      116b5c6e9ec222226c39b3255ab11548

      SHA1

      aec4457c3ec353db528f943cfe7f4a0d608bd835

      SHA256

      eb2a4aad7092a62ae7b89df476e276697dc7a6c48df388556692057fc5e9e3ed

      SHA512

      5334400be47813c3e91b337cb5ed667fbd9e547c0711841427597e80ea721a0139ce6cf44ad37af1d63588a8d4f4c18e679839b3a6ffcef1665f728e911bcea1

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      6fbae55c455363c9109912cdbaf3d49d

      SHA1

      dc9410ed957e45bf3e0fdcaea8743f55edf46b4d

      SHA256

      09a1e03ec85962c7263efb405f318b1b71003ca78815537a48a65bcf9149fd69

      SHA512

      1bbe83387765b521de4e75908beb501b4b11ecc5b9d7866b31f0b6633f1479184eae097b3bb66ab481583f9a0c4f05dc36f0618f69490e172538fa41d1eebc87

    • \??\Volume{fa35ad82-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ba9dddc5-d736-466c-b2ce-3e71a0d428cc}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      581e49a5d388ee47d832cdc43f85c1f1

      SHA1

      fcf027e292258887c710c3da11d272d07972f2d4

      SHA256

      61dfb3ffb24d625c2193da61d946d7c7ca41472ff49577aba5713228708b9981

      SHA512

      e6d266f654f80f3bce8f0d7cbe80bb2843c700908600b81009c2a2183eb3f5eb005d472ebd1d8d0682c211512a793b147e997e0514ea62c0ff597593fbfa8932