Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 11:56

General

  • Target

    0a87b88c5ce3cc574ea0156658f262b8_JaffaCakes118.exe

  • Size

    740KB

  • MD5

    0a87b88c5ce3cc574ea0156658f262b8

  • SHA1

    9a76df34ea21dd143bebc8c52dad442efabea189

  • SHA256

    6c278feb11d76e076fef0bc71def1ad0d901d3e7b9f7477cae7c9b7d310caab2

  • SHA512

    c1f3a6c889fd9b68dc30592d7fcea2b7e407e8426dbb5e4ce29aea1a83054cfdca3a7a08a883f9b50b15b09016e26d1f9fba7b48983d008ffecafd1075ec439b

  • SSDEEP

    12288:zgHsqmAdjxORA4GTe2Pr9hroyCMJOcddfm+YvT:zqmwjfz79iSJOUYr

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 30 IoCs
  • Disables RegEdit via registry modification 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a87b88c5ce3cc574ea0156658f262b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a87b88c5ce3cc574ea0156658f262b8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\obhqxfrnylr.exe
      "C:\Users\Admin\AppData\Local\Temp\obhqxfrnylr.exe" "c:\users\admin\appdata\local\temp\0a87b88c5ce3cc574ea0156658f262b8_jaffacakes118.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4528
      • C:\Users\Admin\AppData\Local\Temp\whjpykn.exe
        "C:\Users\Admin\AppData\Local\Temp\whjpykn.exe" "-c:\users\admin\appdata\local\temp\0a87b88c5ce3cc574ea0156658f262b8_jaffacakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:320
      • C:\Users\Admin\AppData\Local\Temp\whjpykn.exe
        "C:\Users\Admin\AppData\Local\Temp\whjpykn.exe" "-c:\users\admin\appdata\local\temp\0a87b88c5ce3cc574ea0156658f262b8_jaffacakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2808
    • C:\Users\Admin\AppData\Local\Temp\obhqxfrnylr.exe
      "C:\Users\Admin\AppData\Local\Temp\obhqxfrnylr.exe" "c:\users\admin\appdata\local\temp\0a87b88c5ce3cc574ea0156658f262b8_jaffacakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:2676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          a9159224cc6baf8f195a68ae55610d29

          SHA1

          2ccfd6a7f5c5c0722dccb8450fa904e0bc04d27c

          SHA256

          96cb0b5e1f77785268997139b0814097ddba673b25cdc125a099cf4afc87153d

          SHA512

          dc0e68fdb37df63988b37b5bf00e18167d3529540c2242542406f497029efd05437e38c385f38a971bdf1111488ea81608ddc21b58498bc20a091441b392879f

        • C:\Program Files (x86)\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          4a3987af2fab4164a44a1badffa7e67a

          SHA1

          536e07aa9c32dd4703e7dfff329f6bd140764209

          SHA256

          528b381fae0b8ef3fe1be4856002969d1f9aa042e99c552f7bb5d183b7136df7

          SHA512

          9756a24e312cb8f8251695e6c34af0aa5220a7e54317a875e111263abb526524dfc43b73d46653fb34a44285b51403b5bf43d583775ebcb3dbb20d95b0e9de5b

        • C:\Program Files (x86)\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          80f822b54083016ff56184295a4fb9ee

          SHA1

          bf2c020e44079464b890448f9f9e7007ce45293e

          SHA256

          5be0fa40d237d2247a8ac14c774f6f3039d093328cad5173f19a843f1d6bf8ed

          SHA512

          8f1d2420a04fe58fc5251f96a7b6dc41ef5a7a64abfe34c300e6f08b940b61f6116d44d75b2aa9fa6b6a8a4ebabfff5b543429ddfa86542155f16040e421f682

        • C:\Program Files (x86)\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          5be1214c43b85f3449f5baaf128b8afa

          SHA1

          4b795e715d1831a366c898c7596ef8d52c7152e8

          SHA256

          30f3c82dab03e611484c960fbe531d6eee93bf1b9308ea716f356980a983af78

          SHA512

          d9590d9ba01b92330c1775da287ce81a2c05a5cbef429d1f3797fef6850d15f7df85accf8c1d72f853ba9e87993ddd9570cff81b0ba5fc6e273206ac62d66cb3

        • C:\Program Files (x86)\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          08b5e4b2de7e3a9c2b796729a5f7956e

          SHA1

          375e48b9f4114ef3ddebe1d9f0bd90f1759ff9df

          SHA256

          a047ffa86aac3cdfc5c85a5465d9b7879cbbb939377fe432d13526836846f594

          SHA512

          281e2adcba6adfe8ee5667d3f7aa5bf28858ef7ee76ec1d1d61d5b427bf7dd9a1be83103168992ca1d19b8f35e1f763e5b57993e944be11f6c826ceaf00877c1

        • C:\Program Files (x86)\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          78fee3a0a144e299f57de82a56fe9701

          SHA1

          7368f8806c2a8321b2666d8c8dad8c0ba58c10f3

          SHA256

          586bd4611669f0fc8fcef041527273b1ac045cd500f97e1d77fece35c9e6b2b8

          SHA512

          d833b3814b6014d0194087ebe924ee6edf1e3d7ebd3d3a447739ea69ab64c2ce410d629e448b52ee2122e3d05ea5fe443b3b88fbb961682dd3be525f91798cb1

        • C:\Users\Admin\AppData\Local\Temp\obhqxfrnylr.exe

          Filesize

          320KB

          MD5

          b92314203327a733531042bc58e54f57

          SHA1

          1f3d0081f308a82c9659f4a57fc1ad551167a181

          SHA256

          d936bfd3b4264fe1650dee22119858b9d0cc58598e7e956ebecf72fb82f7c7d3

          SHA512

          2982559183e13830cd795c7badadb15b4dad50315155299d9713970aff034c827ade98c79d6da836aea743890aca71bc0f7d5348a32f2858b4f40884ecccf7f7

        • C:\Users\Admin\AppData\Local\Temp\whjpykn.exe

          Filesize

          720KB

          MD5

          b159f04ab4b7dd5be8b15ebffaff75e5

          SHA1

          f2f1f8d454c0cbe7cc9e512620db3f7ff6f2e6e2

          SHA256

          6a6cfc7830c41486e858dc82814a98dc0fa0aad376fbc2eb08074eeddd8a5a80

          SHA512

          6185fc55aa1f3ebb5e1b63765132ca687da6b00c1db46113295ab616656a0147403ed3ff3374ade45a9a5cc0ce6be54ba7494ea134853606c6edf71063d11b6e

        • C:\Users\Admin\AppData\Local\qflviyfnzmuhnwdlxtgvblyovdpckxdmt.njw

          Filesize

          3KB

          MD5

          f3e563444d75824c7fc6d5b4f0b15fff

          SHA1

          e4f9d4607f56531f34e68a539b8869cf202b7630

          SHA256

          f1571bea737bbae171f2819488567ab2d52bd0546d504c3fe5b58731a827ede7

          SHA512

          9325560fb5b156cca75bfff450d4bf9993aefb100d1eb6132a81b1f34adb47c2d092e2ff7e1c3be467b82541ae55ab4991aed27da5a16ebdc6098212e0622d24

        • C:\Users\Admin\AppData\Local\zdyxzeaxyaxzusolmxzdyx.eax

          Filesize

          272B

          MD5

          3f133736fb734eb8613b9c049f17ad2e

          SHA1

          c67af41ecacf7d726d3b53cc6f56208fa47442ae

          SHA256

          85d8e69de8e89c532a3e21425fcae0d690f5a1974675477da106a1e8d9fbd9ea

          SHA512

          f67894e442276ac5617f32d67e04011ae44e1262588fc2fd9933d343140a0d6683394ccf9baf3713d372ffdafb9ad586a9fc068f4156a1531ab88b90f122fa67

        • C:\Windows\SysWOW64\lhulfcqfyshboeshad.exe

          Filesize

          740KB

          MD5

          0a87b88c5ce3cc574ea0156658f262b8

          SHA1

          9a76df34ea21dd143bebc8c52dad442efabea189

          SHA256

          6c278feb11d76e076fef0bc71def1ad0d901d3e7b9f7477cae7c9b7d310caab2

          SHA512

          c1f3a6c889fd9b68dc30592d7fcea2b7e407e8426dbb5e4ce29aea1a83054cfdca3a7a08a883f9b50b15b09016e26d1f9fba7b48983d008ffecafd1075ec439b