Analysis

  • max time kernel
    12s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 13:34

General

  • Target

    fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe

  • Size

    516KB

  • MD5

    fa7ee2803e4170f1a9c6055410fb9f08

  • SHA1

    7beec9c477ce767060efbfa1157a0475c47f8f65

  • SHA256

    9cae1475f72ead9c1d59361ad45d167b1c2c92972bed3188de2f96981c87e883

  • SHA512

    d4583ba4fa6a2f24d6cda7776e9a59a07055c0ab44fb201b029c73e5999aa5669ec17b0c8de06bf524a2f853cf8569bb2a033c765ad557f63e35ea485a63d69f

  • SSDEEP

    6144:kTnjnvrM3mjHGh5Doh9Z5cAea4Jv81E66Hwc2Fq4t:kHn438Hwerea2vEEFz2F

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 28 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 9 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT /delete /yes
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\SysWOW64\at.exe
        AT /delete /yes
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2924
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\SysWOW64\at.exe
        AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4388
    • C:\Users\Admin\AppData\Local\Temp\~47b8889f.tmp
      "C:\Users\Admin\AppData\Local\Temp\~47b8889f.tmp"
      2⤵
        PID:4956
      • C:\Users\Admin\AppData\Local\Temp\~ac215690.tmp
        "C:\Users\Admin\AppData\Local\Temp\~ac215690.tmp"
        2⤵
          PID:5116
        • C:\Users\Admin\AppData\Local\Temp\~f3d9f4d6.tmp
          "C:\Users\Admin\AppData\Local\Temp\~f3d9f4d6.tmp"
          2⤵
            PID:2584
          • C:\Users\Admin\AppData\Local\Temp\~6468d4a0.tmp
            "C:\Users\Admin\AppData\Local\Temp\~6468d4a0.tmp"
            2⤵
              PID:2072
            • C:\Users\Admin\AppData\Local\Temp\~72c0fd40.tmp
              "C:\Users\Admin\AppData\Local\Temp\~72c0fd40.tmp"
              2⤵
                PID:4928

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\~47b8889f.tmp

              Filesize

              66KB

              MD5

              08947ae2d3c65af810560dae3c5f89ca

              SHA1

              6437308a4218e00073132ad18ded71a35a014f4c

              SHA256

              086588d3918111abcd1fc047c1a0886539291ced0bcb1fb4f9ae4a8f3e4a868c

              SHA512

              d2abe0cfbc1ea49f297034b1cb16ee2687cedebabcd981c52fbf793e326bc04b6210ec01ce0d9378bf9e0a5683da441b682841be41ef7e2494cb82d31556a4be

            • C:\Users\Admin\AppData\Local\Temp\~6468d4a0.tmp

              Filesize

              66KB

              MD5

              16875f251a7381c81f66f9c4cf1d1433

              SHA1

              df2ab65e2547405aca0642e8d8afe0826c8016fa

              SHA256

              cbbef400e14f6dfdb1480aebcb140c3a079cf4cb5d832778ebbc9da197277994

              SHA512

              eeeb0a982e632155fced55facf9359c4ec46c1af103550eca3fe10cbf707fa3e7eca71e1636c6b494c49d5cbf271bae0ed0caeaacb56d0e06535632ce1348fed

            • C:\Users\Admin\AppData\Local\Temp\~72c0fd40.tmp

              Filesize

              66KB

              MD5

              4da191d0b79865de679b4745f32de5f9

              SHA1

              986e58b0dbf07ec7e3cde512356f85f06c9022a9

              SHA256

              a7d835c093256b985d0051c8d6c8ef10851c9d40c12398e977bc57b7de7738bf

              SHA512

              47121e6708f61d2cb31ec9b13f5e259802e1feaf4d1d6ad1b8f01a92b61a075f5c5af5e2e5203372df254c9992b96098bc5690f1eab426bbf55aa483360b4bc1

            • C:\Users\Admin\AppData\Local\Temp\~ac215690.tmp

              Filesize

              66KB

              MD5

              c3e2e4d3b06a0c418ccde0d235bc2b10

              SHA1

              71ce2c21814fb3f6587029bfb029541febbd094a

              SHA256

              92360a6f19cdbfb2a7d99a03662bafcb4f3db8c660edf4ab86fb41a5c5da5838

              SHA512

              9084d1a6abb9b8254c0754a57434476e7d5189ba12bb8053a38ff5a8ac61518d86b835ad387cd94b6a35dd931e11d99ba1b504780e27b9308ca49d77c0c038ce

            • C:\Users\Admin\AppData\Local\Temp\~f3d9f4d6.tmp

              Filesize

              66KB

              MD5

              da45853ce6a547fc0b9e08bb05443e67

              SHA1

              61fc4d97171bc97f58d4192cf7ba86ffabc0053d

              SHA256

              c9bf3431b0c67b82ed97b9d4a9f2c9d158d3a2f371ad41f1706c7a8a15342e9a

              SHA512

              b1748e533a9ec728259da4472fa296b0d1436e6092ab94450b1bce77f6e70d3cc52206b6426247a651c10e5a14b131295f4d0d5b091cddc79c480e9f6f52437d

            • C:\Windows\SysWOW64\autorun.ini

              Filesize

              103B

              MD5

              71ba948ec18ea42865d9a953fca1eac3

              SHA1

              35d35b1b2ac08f0898b036328f18a96de87ef2b4

              SHA256

              d3d3c8b704a1176512eec636590c78467c9f3873f5fc74820130730af7338e14

              SHA512

              1ac98f09cd05c8798bd54a8db067935efb3fa530fa9d1ef85cd24f88f95e938cf31f1c40676d0be1192b3d32dacd087e76bbf120219acae59b8334c2c671838b

            • C:\Windows\SysWOW64\blastclnnn.exe

              Filesize

              516KB

              MD5

              fa7ee2803e4170f1a9c6055410fb9f08

              SHA1

              7beec9c477ce767060efbfa1157a0475c47f8f65

              SHA256

              9cae1475f72ead9c1d59361ad45d167b1c2c92972bed3188de2f96981c87e883

              SHA512

              d4583ba4fa6a2f24d6cda7776e9a59a07055c0ab44fb201b029c73e5999aa5669ec17b0c8de06bf524a2f853cf8569bb2a033c765ad557f63e35ea485a63d69f

            • C:\Windows\SysWOW64\setting.ini

              Filesize

              149KB

              MD5

              264ecd0c8b60215ffb5af78c1d96e4c6

              SHA1

              0c56e0e590e466b3d07db1267d05950654103f3e

              SHA256

              a49d7b5b982ef255f6157e7af0f8bc4fe951afbc011a6e853339b96e7b792429

              SHA512

              8f772bad3c1a62b57dd3fe30fe4228ff7aa2d8a41ddfe4fd9419f5294ba962ab5f2e145d362383bd0e678056eb8bcc1b156c022110d7d5c985da605af1e167bf

            • C:\Windows\SysWOW64\wd273296.dll

              Filesize

              80KB

              MD5

              9b02808f4e0b8a5e71a37949b6db062b

              SHA1

              715e45ad25db0fd7d2c1d856906637fd6467715c

              SHA256

              0c8f585418bce392ecbd330bae9a3535a4d92a2c9283e031024612935641cc30

              SHA512

              91844eb4490713c328704a0e4351fbce976a72136622b21f56fd9ae6f821eb5aa445c61ad07d885e67b126a2e66c3bb73d8e90bc305ffb48c94dcac650c6f415

            • memory/1548-89-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-52-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-54-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-99-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-98-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-97-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-53-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-96-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-95-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-92-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-91-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-90-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-7-0x0000000010000000-0x0000000010015000-memory.dmp

              Filesize

              84KB

            • memory/1548-94-0x0000000010000000-0x0000000010015000-memory.dmp

              Filesize

              84KB

            • memory/1548-93-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/1548-0-0x0000000000400000-0x00000000004C4000-memory.dmp

              Filesize

              784KB

            • memory/2072-78-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2072-76-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2584-70-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2584-72-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/4928-85-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/4928-82-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/4956-58-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/4956-62-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/5116-67-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/5116-64-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB