Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 03:31

General

  • Target

    0436a71bd5b7eebf611713cdeeb2414f_JaffaCakes118.exe

  • Size

    153KB

  • MD5

    0436a71bd5b7eebf611713cdeeb2414f

  • SHA1

    757ebd01bdbb002be1a696c059092a191f77d450

  • SHA256

    dec9dcc53d1de7fe3492f327f928cf5e94d2e0d983e5009e8bac95219064d159

  • SHA512

    3af1283c17a77a3d352c71dceabe21b60260b8ee64399380eef30c80c5c13c3a8cc1303dd1d98914fca39def1470502e7c0280ed342181d8e2c20ac986329770

  • SSDEEP

    768:P0+/kNmsZKhQR5MnFQlBzkRy0L5gzQ1s96dnecPwsA/dbCtIvoVZvt5BMCwc5Fg4:7k8s7vMnFMgR3r1el2tIvk58c5Fgsd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 18 IoCs
  • Disables RegEdit via registry modification 8 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0436a71bd5b7eebf611713cdeeb2414f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0436a71bd5b7eebf611713cdeeb2414f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Windows\SysWOW64\s4827\smss.exe
      "C:\Windows\system32\s4827\smss.exe" ~Brontok~Log~
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4268
      • C:\Windows\SysWOW64\s4827\winlogon.exe
        "C:\Windows\system32\s4827\winlogon.exe" ~Brontok~Is~The~Best~
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\SysWOW64\s4827\services.exe
          "C:\Windows\system32\s4827\services.exe" ~Brontok~Serv~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:4520
        • C:\Windows\SysWOW64\s4827\csrss.exe
          "C:\Windows\system32\s4827\csrss.exe" ~Brontok~SpreadMail~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2000
        • C:\Windows\SysWOW64\s4827\lsass.exe
          "C:\Windows\system32\s4827\lsass.exe" ~Brontok~Network~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c net view /domain > "C:\Windows\system32\s4827\domlist.txt"
            5⤵
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3560
            • C:\Windows\SysWOW64\net.exe
              net view /domain
              6⤵
              • System Location Discovery: System Language Discovery
              • Discovers systems in the same network
              PID:3532
        • C:\Windows\Ad10218\qm4623.exe
          "C:\Windows\Ad10218\qm4623.exe" ~Brontok~Back~Log~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2532
        • C:\Windows\SysWOW64\s4827\m4623.exe
          "C:\Windows\system32\s4827\m4623.exe" ~Brontok~Back~Log~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:3392
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" /delete /y
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4280
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4856
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\c_28092k.com

    Filesize

    128KB

    MD5

    3c0c239c312334edf86e656081ec0e6f

    SHA1

    010d545a5ef61c9f769c86aa1a958807e0b16e35

    SHA256

    bd51a65a181364eb7a31fc1b79e29854a91cccd04bf44732e83ad8349bc67224

    SHA512

    0c3efc560678856f762f9cd4c38cbedaeb0d5c00373c914316a9e63c603aba0b09a49f507065005c69df202c709a9fbd4176610a03bfe4beeec3bc168442064c

  • C:\Windows\SysWOW64\c_28092k.com

    Filesize

    153KB

    MD5

    0436a71bd5b7eebf611713cdeeb2414f

    SHA1

    757ebd01bdbb002be1a696c059092a191f77d450

    SHA256

    dec9dcc53d1de7fe3492f327f928cf5e94d2e0d983e5009e8bac95219064d159

    SHA512

    3af1283c17a77a3d352c71dceabe21b60260b8ee64399380eef30c80c5c13c3a8cc1303dd1d98914fca39def1470502e7c0280ed342181d8e2c20ac986329770

  • memory/2000-325-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-1392-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-514-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-1679-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-1535-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-1249-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-1086-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-665-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-367-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-943-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2532-813-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-796-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-1225-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-646-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-1825-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-280-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-1074-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-1675-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-497-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-1518-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-926-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-1375-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2668-352-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2836-353-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3152-45-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3152-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-1680-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-1087-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-515-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-1536-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-372-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-1250-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-666-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-944-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-1393-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3392-814-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4268-165-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-1377-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-304-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-1532-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-797-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-1676-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-940-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-1226-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-1083-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4520-1826-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB