Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 23:43

General

  • Target

    ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe

  • Size

    966KB

  • MD5

    ff8474d470fdc01c846c76a7b8d8e227

  • SHA1

    83335bf4fe9bd1b6a9da68c6db47de241d962fb4

  • SHA256

    202b03238891fc5dc5b078d02b9ca9daa26d0c1f338930563d88eca728c5df71

  • SHA512

    e1863ea8fce0c3af0901443513b0d65b9b792ea5aff9a7c60947f713669e60ed60b778e3dc4aeb5e1d29c554754e471f87f049e4d04bbacee978081130b887f3

  • SSDEEP

    24576:tMMSw3gK+vH1+F0QrOFEk908IkpVd1mqUp+:uZ1KHF0qg9N37d1mtE

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Users\Admin\AppData\Local\scrss.exe
        "C:\Users\Admin\AppData\Local\scrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2540
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c syscheck.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f
            5⤵
            • Adds policy Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    538KB

    MD5

    f7d222333d3ce07721e18537287a1f23

    SHA1

    53253d51525d1979907b985dfc88097f068491f2

    SHA256

    267ac2410719782b180d9776d9c61d86616d5a5762d97013566079b067fcb70a

    SHA512

    02a57569478a5f9c7d68a0a2b9fb855d8b753a7fc8e5fe7875af1a877dbbc8016b88ad3be64a271a44992ff664976abdb017bab493a1168e4963c993e991b7bb

  • C:\Users\Admin\AppData\Local\Temp\syscheck.bat

    Filesize

    168B

    MD5

    0d92b381efa1a49bd3cc2cf3ff28bd45

    SHA1

    23fac6be89436f94a4f8fca5057be514c787b9b6

    SHA256

    b5b5a4055d2b10d9e6af0580c28ee9099632cc36eaa946ce442f65a77ee92e84

    SHA512

    78b611a37cf21a0bb26204f0f3057b5d800be3c2ad8190af06725e82bdcc883473cb0087f1f7bc8c0199467d14282ea92d340421d8bf796f7e45451727f66391

  • C:\Users\Admin\AppData\Local\ntldr.dll

    Filesize

    92KB

    MD5

    8a5e40eb6518353e5758e5b237897c78

    SHA1

    dd452e565485f48c2131dadc40a32b0d3007cef6

    SHA256

    5f8ba5c1522847452d92b507770bfb454548d8a02232040c6be4323792400d4f

    SHA512

    c941b82c3bd6be61506ac9215ab8e26983a8654444703b5a0236739a3b50a498ed0c65054b68481c026123d88b0f0e9e36f92b0f0028b4cc034345ec17f3b268

  • C:\Users\Admin\AppData\Local\scrss.exe

    Filesize

    237KB

    MD5

    624edbd68e18dea398619afee2527dac

    SHA1

    dd7d730ac852b950fbf7ea8d52bd13f4559b1c88

    SHA256

    0c66024d2bcbab2b4bd0eb35ff970768cf98343cefc89cd0aff205bc7f93627f

    SHA512

    4b99200b19165ddc966e901d35f1377738e4d8cbc5e56f359fa64733e83942088f742cf1637931eaa7796fd01f8f329e2b351cf8bdc98b318d6646b698f5e929

  • memory/1920-0-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/1920-9-0x0000000004000000-0x00000000040F9000-memory.dmp

    Filesize

    996KB

  • memory/2540-24-0x0000000002280000-0x000000000229C000-memory.dmp

    Filesize

    112KB

  • memory/2540-27-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2540-28-0x0000000002280000-0x000000000229C000-memory.dmp

    Filesize

    112KB

  • memory/2540-33-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2540-39-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2540-45-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2540-51-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/5080-26-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB