Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 12:27

General

  • Target

    1814bd26ef7362967ef0151d22c4fdb8_JaffaCakes118.exe

  • Size

    216KB

  • MD5

    1814bd26ef7362967ef0151d22c4fdb8

  • SHA1

    5506d7fa24bfc070f44e4a75105d71bc2379fbcc

  • SHA256

    b5400895b5618797c36dc82b007ea707521b31b425f9a3af7754b7856e673f72

  • SHA512

    fd886049aa4a5365e9927e4c254b2109476d63bbf791db06ee462bd4962812af82ff39532eed42c7b69dcf025c76ea9f08b93c31db785a8244065a4caab7b0da

  • SSDEEP

    3072:Muiqy3ePOYe4bu1epDh8RWsAcSbkKYjRMmSCH8RWXoiISUmjO3Nney9:E3yOYTuxVkURMRdUjSJ

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 46 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1814bd26ef7362967ef0151d22c4fdb8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1814bd26ef7362967ef0151d22c4fdb8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\amd64.exe
        "C:\Users\Admin\AppData\Local\Temp\amd64.exe" install C:\Windows\Inf\Netloop.inf *MSLOOP
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2396
    • C:\Windows\SYSTEM32\netsh.exe
      "netsh" int ip add address name="Ethernet 2" 109.234.73.11 255.255.255.0
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      PID:3984
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:492
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\netloop.inf" "netloop.inf:db04a16c8f2dc9fb:kmloop.ndi:10.0.19041.1:*msloop," "4632877cf" "000000000000013C"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\amd64.exe

    Filesize

    80KB

    MD5

    3904d0698962e09da946046020cbcb17

    SHA1

    edae098e7e8452ca6c125cf6362dda3f4d78f0ae

    SHA256

    a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289

    SHA512

    c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea

  • C:\Users\Admin\AppData\Local\Temp\install.bat

    Filesize

    116B

    MD5

    61e3871767fb8ae1b50b40c81992ede7

    SHA1

    b9287a666c9419f4f39488b1b6fea5769dcb7dad

    SHA256

    f580868d82a0f6f413d92414b3e465bf5adacfc3dac236e33dcc0bb75bcadd69

    SHA512

    749beccd8ebad17746447ae0ee42f27ae0f83b3b0365832e066bf55f247106c54ed1f88f08065d1ecb8db04cf3ce99e833382262734e9c45139f6b5db31adb49

  • memory/4044-3-0x000000001BA20000-0x000000001BABC000-memory.dmp

    Filesize

    624KB

  • memory/4044-0-0x00007FFE7A885000-0x00007FFE7A886000-memory.dmp

    Filesize

    4KB

  • memory/4044-4-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB

  • memory/4044-5-0x0000000001410000-0x0000000001418000-memory.dmp

    Filesize

    32KB

  • memory/4044-6-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB

  • memory/4044-7-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB

  • memory/4044-8-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB

  • memory/4044-2-0x000000001C000000-0x000000001C4CE000-memory.dmp

    Filesize

    4.8MB

  • memory/4044-1-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB

  • memory/4044-21-0x00007FFE7A885000-0x00007FFE7A886000-memory.dmp

    Filesize

    4KB

  • memory/4044-22-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB

  • memory/4044-23-0x00007FFE7A5D0000-0x00007FFE7AF71000-memory.dmp

    Filesize

    9.6MB