Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 20:56

General

  • Target

    107b392280ecd6df6b893348c13c18a6_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    107b392280ecd6df6b893348c13c18a6

  • SHA1

    c9c79dada136b7aa50a963cdb6f3bfa95c92e04c

  • SHA256

    a733ef2dec43923b4994733d69ca9fd0f7920b8611596cc64c9bc3d3b2c778e0

  • SHA512

    fc1d025e786de05bc97e810d2be3200c461b097e9e31c90b4a101a312eb66cd8b539aa46f73cb96d4d75d0d3450ea447a018bfec80773b69f92be596f60a08a8

  • SSDEEP

    6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYS:v6Wq4aaE6KwyF5L0Y2D1PqLt

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\107b392280ecd6df6b893348c13c18a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\107b392280ecd6df6b893348c13c18a6_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Windows\svhost.exe
      C:\Windows\svhost.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs.exe

    Filesize

    298KB

    MD5

    60c2318c19b00c477b30b28c6228939c

    SHA1

    742f1a71f0765efb665e154c58747d228b26f925

    SHA256

    cd0f47d16a4ab3d66465a3cf7719ae0448497e96c04e584e10febbc834a75ebb

    SHA512

    e0d9c57e8100e1bd4524f46559205efe157148ff363bb2878b53bec92576e5832d74ca5511419e64eb075ac20db763f5ac50a35b8e11b4a37f6af46d7d50f173

  • C:\Windows\Driver.db

    Filesize

    82B

    MD5

    c2d2dc50dca8a2bfdc8e2d59dfa5796d

    SHA1

    7a6150fc53244e28d1bcea437c0c9d276c41ccad

    SHA256

    b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960

    SHA512

    6cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4

  • C:\Windows\svhost.exe

    Filesize

    298KB

    MD5

    c89cbd403fb4116abb7a691a610a1712

    SHA1

    fbb4f50fb043326a288e9f4710234ec53b53e24f

    SHA256

    846066dfca53500ac45200cb01cdd9535aeaac99040f71fc8f54562b50c84add

    SHA512

    7c275baf24118af73d206ba9a51a692a777058fc4aa38c30785f1adaed0de4b9119aa17ace952ce2b5ae9808f8c04123e348c8014d142e5be6805c66b07d28a2

  • memory/3228-5674-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-7955-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-1131-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-1132-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-2264-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-3406-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-4545-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-15802-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-6816-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-14666-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-9088-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-10231-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-11371-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-12502-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3228-13636-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3724-774-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3724-0-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB