Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 17:00

General

  • Target

    1430b3943e267e84a88e8da33637d086_JaffaCakes118.exe

  • Size

    563KB

  • MD5

    1430b3943e267e84a88e8da33637d086

  • SHA1

    2786953b7c6e471df8a34c46819694bf7e647157

  • SHA256

    d19d23b390f428315e86f41e6fee503652031966caf699ac8212380309067137

  • SHA512

    dfd1bbc987462c3c26e5894f84462b14a6c05666702bcc02234732fc566d4bf5dad517920b0c5abeb466c937cb528670dae741bc194fd3f618d984a7fe02a0a0

  • SSDEEP

    12288:DV+mzHLrr5ueOO+8JA39ro8Y7OiiAvCjLLGfcXh691HHfa1W2:D8AuV8JAFol7MqCjLSfcxYi1D

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 11 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1430b3943e267e84a88e8da33637d086_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1430b3943e267e84a88e8da33637d086_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\1.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c 1.bat
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3996
        • C:\Windows\SysWOW64\sc.exe
          sc create sclic binpath= C:\Windows\sclic.exe type= interact type= own start= auto DisplayName= "Windows Firewall"
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4972
        • C:\Windows\SysWOW64\sc.exe
          sc description sclic "╕·╫┘╧╡═│╩┬╝■ú¼╚τ╡╟┬╝ Windowsú¼═°┬τ╥╘╝░╡τ╘┤╩┬╝■╡╚íú"
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:5096
        • C:\Windows\SysWOW64\sc.exe
          sc start sclic
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:3828
        • C:\Windows\sclic1.exe
          sclic1.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4632
          • C:\Windows\sclic.exe
            C:\Windows\sclic.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4504
  • C:\Windows\sclic.exe
    C:\Windows\sclic.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    PID:2880

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\1.bat

          Filesize

          308B

          MD5

          015f6dc00723b6f318ff74e430bf58ba

          SHA1

          ee0e5e1ae82b58c73ec7599a6ae2ec9526a1ff9c

          SHA256

          74f009e9743aa36690e6d1f8bbf7ab9049564cd9642e950046adfb6bfd02c123

          SHA512

          7ec5983d6a6b46aca3d63a1bdc0f7e640692f772aaf3c2674e83b50fab4c78e93f76011422394539b3120238600771cce6e40f4e4021a804d571c8d4b4ffebf3

        • C:\Windows\1.vbs

          Filesize

          70B

          MD5

          03af6f8727b0f31f2a6fa0e553c3eea5

          SHA1

          65d7a1db8adbbb3fed6885d0921220c3c6eae51d

          SHA256

          0265dd539101782974e766576ce993f6c307c1c3fe77b5b5e14ab6492b7f6721

          SHA512

          eaadacbc138bcf23b8764af50d2198453092c83e704b50cdeb6863eaddbbc62857539365bd7a58b67e14a3e3a1a4298f0ef95069540bb9704d8b08b3a0ef169f

        • C:\Windows\sclic.exe

          Filesize

          508KB

          MD5

          a20023c0dcca59fc4403966e39bc12c7

          SHA1

          427705219288305efa14a1eaef557384b7267ac3

          SHA256

          81cf89b1e7d455bf7d66770503ae1b131db0b518ff7bbf53c7f2c8ae93b177dd

          SHA512

          9555a06142817fbe96bb6547eb93bed0e1522582a95f51c63f8fcc0ca0fbef39a93ba65bdbcefc44c91b32fde77dd7a6ddf0964e24ed47cbc8296edc771a0336

        • memory/2880-14-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2880-15-0x00000000006C0000-0x0000000000700000-memory.dmp

          Filesize

          256KB

        • memory/2880-16-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2880-17-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2880-19-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2880-21-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2880-22-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2880-23-0x00000000006C0000-0x0000000000700000-memory.dmp

          Filesize

          256KB

        • memory/4064-20-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4504-42-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4504-38-0x0000000002050000-0x0000000002090000-memory.dmp

          Filesize

          256KB

        • memory/4504-39-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4504-40-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4504-47-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4504-48-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4632-30-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4632-33-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4632-31-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4632-29-0x0000000000680000-0x00000000006C0000-memory.dmp

          Filesize

          256KB

        • memory/4632-28-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4632-46-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4632-44-0x0000000000680000-0x00000000006C0000-memory.dmp

          Filesize

          256KB