Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 16:48

General

  • Target

    fcbab66716f2764ec763283a31aea632_JaffaCakes118.msi

  • Size

    384KB

  • MD5

    fcbab66716f2764ec763283a31aea632

  • SHA1

    2a915e1b9dbd6976bebdc91eede18e2150964440

  • SHA256

    1cd7639b91bf66a497cf80433f9b30b559dde4062ee9206a7018166ff87ffb97

  • SHA512

    c98a10257f7c39b2011f6d513f574f49a8ae902e38759ccb522c228619fc82f157669690c97e64151fc419b7a4112655943fb7b727a3e503e68094eaba2c9483

  • SSDEEP

    6144:BESymvXBLL/nA9w7l/Fqn7UqGg1d8WZbxTB:BESd9Lhl/Fqn7XG+vXTB

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fcbab66716f2764ec763283a31aea632_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3124
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3004
    • C:\Windows\Installer\MSI4BEA.tmp
      "C:\Windows\Installer\MSI4BEA.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3676
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1056
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4164,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:8
    1⤵
      PID:968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e584a84.rbs

      Filesize

      663B

      MD5

      e788c42dd57065fdf806d3f5093e398e

      SHA1

      c6d27fbba588e40c43921091db2f778a72076479

      SHA256

      9ab3e4d750d29c4ee63ca6aa8faa9b186c448dd9b07f9e7d688efedf5d1353b8

      SHA512

      f243f4eae818e0fd1e763a3af5cca4e176b02d81333cc65b8ad3ecfaa8ef6b5ca1e8a1c690176c31afb08ccf6a7f16f566c327852b80901ca7c5a84f461d6af2

    • C:\Windows\Installer\MSI4BEA.tmp

      Filesize

      357KB

      MD5

      f8739e104580fdda6302c7d4022d0613

      SHA1

      c19d4db77c4e10f829e6ca4798f75e22fd89a5b5

      SHA256

      8163f92c4b861cb6911e7629f48aa5f2a3a5fb794f64dc75c5796902733a71cb

      SHA512

      5d2f3dae9fa3b9750af8a16f953e738241f3e3a358514a7d98035a717ddd97523db71d528bba3381d158f677a9804e8c2127237032d0134439221de6b63ef404

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      e232b95c43401d26d390a893c2821041

      SHA1

      041c71fd66b4526e08f1e7649fb70c79f95ba477

      SHA256

      1792a9378c6476ac593493e556b0585b4f5d22f1c913de014bb3b42763611615

      SHA512

      90d54bac76273b0b5067304129252b3c2cdaa829f1e8143f5804c5af75f8a1e3444652836bdb4ae041b7e62f8f6370522cf657fe2bc0f7d2442cb70a6446d2f4

    • \??\Volume{ff3ab8f7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0402b5e0-635c-457e-a7cb-0e7468e36e7b}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      f4e103c47ce004044f2988ac6a415bb7

      SHA1

      c2adbff245267aecd06b0344f7dcaf1f4c30a87a

      SHA256

      37e1061831a704574b37e8af8e0982df938c22b19bb2fba64191d5eed9001fdf

      SHA512

      12737c4e16cfaabc1e6c54b635e74aadb1b7c14e2e2948dbb9878f3fa2e641ceef1c4fcac8344a244ad5e000bcd09d987be6b734804c7f42cb70c9f232eb77f6