Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 02:41

General

  • Target

    295cc3b23f85406482718a84ac12667c_JaffaCakes118.exe

  • Size

    352KB

  • MD5

    295cc3b23f85406482718a84ac12667c

  • SHA1

    dbff739862ae87ce2014e02d19e95078b47f0c18

  • SHA256

    157ab7601903696053a7db033923b9eaca049c1138b21520d78d782306312232

  • SHA512

    f4e40084f550d0c48840d8111b4e4e7de2eefec551d3d92f3f4ea2a356fab7d09b07c71ceb915c98171efce13069ba9221ee83f87f80bfd333d4fe93b4b8e5f9

  • SSDEEP

    6144:Ap2qm4uyX++8DKNT3gQI1C43WnaJF19eAyFHQUYJ/31u3jmDrcz7n/p5:AAl4uO8DKNbgw4GnaJtejFHL33j6cz7z

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 16 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • AutoIT Executable 31 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 8 IoCs
  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\295cc3b23f85406482718a84ac12667c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\295cc3b23f85406482718a84ac12667c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Windows\SysWOW64\Rundll32.exe
      Rundll32.exe shimgvw.dll, ImageView_Fullscreen
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2464
    • C:\Users\Admin\AppData\Roaming\Java\ϝshimgvwʅ.exe
      "C:\Users\Admin\AppData\Roaming\Java\ϝshimgvwʅ.exe"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Windows security bypass
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Checks for any installed AV software in registry
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • System policy modification
      PID:4124
    • C:\Users\Admin\AppData\Roaming\Java\ߙJviewʚ.exe
      "C:\Users\Admin\AppData\Roaming\Java\ߙJviewʚ.exe"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Windows security bypass
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Checks for any installed AV software in registry
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • System policy modification
      PID:3952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\autBE20.tmp

          Filesize

          4KB

          MD5

          d9ade77b9d242a66b758ed5fde50b4ca

          SHA1

          05a211b7e8ba678b30174d880d090762c6bacf45

          SHA256

          c3d7fbd0a861a18e42538af7531da5d502d7ac59b6b8dca438dd5a53af3ce51e

          SHA512

          ed97be6ac38df746b15c630997b828c9e3cfc9bdfacb118faf115fceffc3d7c2ade44fe1263ae77b36b2fb40b00d9eb77c0f2e847327117b61209f60557a2150

        • C:\Users\Admin\AppData\Local\Temp\gyfuosc

          Filesize

          48KB

          MD5

          a3cdde0e33417b12b399f9f19c1c6a02

          SHA1

          f76abb20cb7e1420cdfcb449670b76368dd0cf16

          SHA256

          d54f6a6284324f7237f8cec0347c34436b504b169d567e2c5f70d6627c171690

          SHA512

          74aabcf764a848f3a416bfd50cd11ebf64d456dff0ab5127fca5e3ff74ea697d180ff6a47f7d8ccbd6f609fcd7a2dda9f7490281070954d49f8b1cf9a488ef86

        • C:\Users\Admin\AppData\Roaming\Java\desktop.ini

          Filesize

          60B

          MD5

          f4c9af294e039c9a006fe34a210e0d9a

          SHA1

          51f0831826e5b6ea363d4270aa11fea1b316687e

          SHA256

          4da6dfcad4b86e00e32d9d32d9a71a7ae35af2bceff9c16e3c671a3d2a279c3c

          SHA512

          c9561594aea9e40899af31574e1aceaeb9d161956bf668e2fce4c2c7ca5c0c92fe14da1e258a38c82c8f788e0d75b0f28ded74774ead52e31f0e6596d77faa97

        • C:\Users\Admin\AppData\Roaming\Java\ϝshimgvwʅ.exe

          Filesize

          352KB

          MD5

          295cc3b23f85406482718a84ac12667c

          SHA1

          dbff739862ae87ce2014e02d19e95078b47f0c18

          SHA256

          157ab7601903696053a7db033923b9eaca049c1138b21520d78d782306312232

          SHA512

          f4e40084f550d0c48840d8111b4e4e7de2eefec551d3d92f3f4ea2a356fab7d09b07c71ceb915c98171efce13069ba9221ee83f87f80bfd333d4fe93b4b8e5f9

        • memory/3952-177-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-173-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-181-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-183-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-165-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-175-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-154-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-179-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-156-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-171-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-158-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-160-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-170-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-167-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/3952-162-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-153-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-155-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-166-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-161-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-168-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-169-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-159-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-157-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-172-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-164-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-174-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-182-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-176-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-152-0x00000000000D0000-0x00000000000D2000-memory.dmp

          Filesize

          8KB

        • memory/4124-178-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4124-81-0x00000000000D0000-0x00000000000D2000-memory.dmp

          Filesize

          8KB

        • memory/4124-180-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4728-134-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4728-0-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4728-1-0x00000000001A0000-0x00000000001A2000-memory.dmp

          Filesize

          8KB