Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 10:04

General

  • Target

    12e21b66009632c9a7c68ea56c4f31a6_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    12e21b66009632c9a7c68ea56c4f31a6

  • SHA1

    138710a8f7d1db8be79347aafd5ea05efccbf430

  • SHA256

    09b671e8aa1fe9649e162e9e2826e582a979117270f5d12cab6754813b2feb87

  • SHA512

    7505186ccc3cd37d248e582fb44c7ca10c9019b00f1fb2fcfa11e69c02608fdf62ea9eefdcc66f4ff68f3499410997a3409bd08105463c56ca7bd282dd8981d9

  • SSDEEP

    768:IcGUmbtwHyyE1J4JCKNiQdfcidlB9BOyjMZd:IFb6ylyo2B9J+

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12e21b66009632c9a7c68ea56c4f31a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\12e21b66009632c9a7c68ea56c4f31a6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\12E21B~1.EXE >> NUL
      2⤵
      • System Location Discovery: System Language Discovery
      PID:320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Fonts\fyrwJf5Qfhh.fon

    Filesize

    18KB

    MD5

    19efd3c5588ca8ae6869d07d3297b912

    SHA1

    2e6753d99f67d0d24087875f9ffcdfe4a0ede063

    SHA256

    9bdc6752f72f3452c2029e2ee9fe5875005a8346dcebbcd6ca8f306a6b4cd603

    SHA512

    e4cdd191ca525808976b4e67ed92212896358661aa59daf99570c0467132b44a5a9cadad67af187c22f62ae6b59e2020e42dbdf4d23e789fd8a2656c7f2182b4

  • memory/4488-4-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/4488-8-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB