Analysis

  • max time kernel
    96s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 08:08

General

  • Target

    16de43c28535a3016739fdddd28760c4_JaffaCakes118.exe

  • Size

    281KB

  • MD5

    16de43c28535a3016739fdddd28760c4

  • SHA1

    51e1572a3e33cb6fb129736eda31d33eee6a043f

  • SHA256

    b85660b47c1f3b98f0101dd4acbbec681fc67b8ac381c3ac1bd1306a159b3abd

  • SHA512

    e28fbdd54960557ff9b93bd40e83fd016f099758fc9c291e519a8f22fb8a7e48966bdc3f839d532ebb75e5a66e7072c8ebdc5ed00bb7726251e7a276e6aac455

  • SSDEEP

    6144:gScrL/4mp8D6WGc/YSlIipBReubLzeh7Yy0iMIdeXijX:xcIy78QSVnNyhs4MCeSjX

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 8 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\16de43c28535a3016739fdddd28760c4_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\16de43c28535a3016739fdddd28760c4_JaffaCakes118.exe"
        2⤵
        • Adds policy Run key to start application
        • Boot or Logon Autostart Execution: Active Setup
        • Checks computer location settings
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1176
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 820
            4⤵
            • Program crash
            PID:716
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:4924
          • C:\Users\Admin\AppData\Local\Temp\16de43c28535a3016739fdddd28760c4_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\16de43c28535a3016739fdddd28760c4_JaffaCakes118.exe"
            3⤵
              PID:3496
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 496
                4⤵
                • Program crash
                PID:4796
            • C:\Windows\SysWOW64\install\server.exe
              "C:\Windows\system32\install\server.exe"
              3⤵
              • Adds policy Run key to start application
              • Boot or Logon Autostart Execution: Active Setup
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              PID:2268
              • C:\Windows\SysWOW64\explorer.exe
                explorer.exe
                4⤵
                • System Location Discovery: System Language Discovery
                PID:5064
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 824
                  5⤵
                  • Program crash
                  PID:4504
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                4⤵
                  PID:4352
                • C:\Windows\SysWOW64\install\server.exe
                  "C:\Windows\SysWOW64\install\server.exe"
                  4⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4764
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 528
                    5⤵
                    • Program crash
                    PID:2876
                • C:\Users\Admin\AppData\Roaming\install\server.exe
                  "C:\Users\Admin\AppData\Roaming\install\server.exe"
                  4⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  PID:2344
                  • C:\Windows\SysWOW64\explorer.exe
                    explorer.exe
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:756
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 812
                      6⤵
                      • Program crash
                      PID:1560
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    5⤵
                      PID:4440
                    • C:\Users\Admin\AppData\Roaming\install\server.exe
                      "C:\Users\Admin\AppData\Roaming\install\server.exe"
                      5⤵
                      • Loads dropped DLL
                      PID:4476
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 496
                        6⤵
                        • Program crash
                        PID:3004
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1176 -ip 1176
              1⤵
                PID:3684
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3496 -ip 3496
                1⤵
                  PID:3664
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5064 -ip 5064
                  1⤵
                    PID:2320
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4764 -ip 4764
                    1⤵
                      PID:972
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 756 -ip 756
                      1⤵
                        PID:4080
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4476 -ip 4476
                        1⤵
                          PID:3676

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

                          Filesize

                          236KB

                          MD5

                          3b4e65df09e0f333ec4e75aa4d5d6515

                          SHA1

                          6ce8efa0dac633f71a1d80b903e6f0c0682c5c3c

                          SHA256

                          247192d7b3deb1fe428a0c35cf551746e0366761ff0be53e4d11594ccad4dadd

                          SHA512

                          e6942803a30679c20b85a3b1f516b0755a36b8f96416e4bab3c367502cabe86939c42014d52209578580a05fb2778dcfda604e0f06844fb965d6752c0ed80b2b

                        • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

                          Filesize

                          236KB

                          MD5

                          8a302f766bb2a2f3d3150b7fe1ed3696

                          SHA1

                          e39ea37bf5031f0bbb3c0d65e352e9affe876cf1

                          SHA256

                          0297fcbb68154b1d4d5b5ef33be103eeb8e6f2098f7bc0c65419083d0752fb49

                          SHA512

                          68f90d1cd3b08c10801ef559831603a997f5d0d959646a2af040fcc91ea60ec5fde27db38f47348fd5ad86dae884bffd37500f95c23181329b4133125e66c916

                        • C:\Windows\SysWOW64\install\server.exe

                          Filesize

                          281KB

                          MD5

                          16de43c28535a3016739fdddd28760c4

                          SHA1

                          51e1572a3e33cb6fb129736eda31d33eee6a043f

                          SHA256

                          b85660b47c1f3b98f0101dd4acbbec681fc67b8ac381c3ac1bd1306a159b3abd

                          SHA512

                          e28fbdd54960557ff9b93bd40e83fd016f099758fc9c291e519a8f22fb8a7e48966bdc3f839d532ebb75e5a66e7072c8ebdc5ed00bb7726251e7a276e6aac455

                        • memory/1176-8-0x0000000000A80000-0x0000000000A81000-memory.dmp

                          Filesize

                          4KB

                        • memory/1176-7-0x00000000007C0000-0x00000000007C1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1176-66-0x0000000003960000-0x0000000003961000-memory.dmp

                          Filesize

                          4KB

                        • memory/1176-67-0x0000000010490000-0x0000000010502000-memory.dmp

                          Filesize

                          456KB

                        • memory/1176-85-0x0000000010490000-0x0000000010502000-memory.dmp

                          Filesize

                          456KB

                        • memory/2888-3-0x0000000010410000-0x0000000010482000-memory.dmp

                          Filesize

                          456KB

                        • memory/2888-63-0x0000000010490000-0x0000000010502000-memory.dmp

                          Filesize

                          456KB

                        • memory/3496-151-0x0000000010590000-0x0000000010602000-memory.dmp

                          Filesize

                          456KB