Analysis

  • max time kernel
    106s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 03:08

General

  • Target

    15ed1604d4e53d9efea6b9db60442816_JaffaCakes118.exe

  • Size

    118KB

  • MD5

    15ed1604d4e53d9efea6b9db60442816

  • SHA1

    200ce47825c630b323e4ba071593be271e52b95c

  • SHA256

    c138cb7ac374963c3d4cedc5964e2d93ff34491c951107d7079aa1472ede2aae

  • SHA512

    5d1353753c765047d1d5ca9bcbe481542e6dc150162b929232d48777583969cb73301f91c5990884d65e3e0c225c2d7f8c18fdcacb8a3d3b24626d081050d5e1

  • SSDEEP

    768:Vsi0NnqrjIcGA+9H5MQO7BUdLOyOLm/Cb5vTOc74Hpyfogpty2uhNqFeTCKp0JGh:VZHIcz+j0W2QA5v974JyZuCTJrv3BMe

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ed1604d4e53d9efea6b9db60442816_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15ed1604d4e53d9efea6b9db60442816_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\ZAYUOZBIDUJF.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3612
    • C:\Users\Admin\AppData\Local\Temp\ScandalJamb.exe
      "C:\Users\Admin\AppData\Local\Temp\ScandalJamb.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:232
    • C:\Users\Admin\AppData\Local\Temp\ScandalJamb.exe
      C:\Users\Admin\AppData\Local\Temp\ScandalJamb.exe
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4612

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\TournamentVandalize\CaulkFlex.exe

          Filesize

          118KB

          MD5

          15ed1604d4e53d9efea6b9db60442816

          SHA1

          200ce47825c630b323e4ba071593be271e52b95c

          SHA256

          c138cb7ac374963c3d4cedc5964e2d93ff34491c951107d7079aa1472ede2aae

          SHA512

          5d1353753c765047d1d5ca9bcbe481542e6dc150162b929232d48777583969cb73301f91c5990884d65e3e0c225c2d7f8c18fdcacb8a3d3b24626d081050d5e1

        • C:\Users\Admin\AppData\Local\Temp\ScandalJamb.exe

          Filesize

          28KB

          MD5

          6697555ead62e6b9fb71a0ffb6d62992

          SHA1

          55b57b52fe0d4af8716db57a98ab011b1dbe4181

          SHA256

          683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

          SHA512

          36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

        • C:\Windows\ZAYUOZBIDUJF.dll

          Filesize

          150KB

          MD5

          0a34d470caf398b187dca9110979e285

          SHA1

          86ab4f87662544d195fb0b941a6483fecd3ab79d

          SHA256

          d20f0a7f695c2d6a842bfc280e1f14a04ac3921218514eb477ae7b6af59be668

          SHA512

          ed292ea1f479ddcf9b6a445e388b729bc6b4525e0c165e28211695062c7a976065625b6c59411c98df161d7a58605159a50fc539a507bb885e0cc643bf52fc79

        • memory/4252-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/4252-22-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB