Analysis

  • max time kernel
    144s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 03:00

General

  • Target

    29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe

  • Size

    308KB

  • MD5

    29a0837edfa46ec5cacf0304f52547f2

  • SHA1

    6352b7b54135e4009fa2cb1effdd2cde11780b1b

  • SHA256

    be5d61b1d8b086ca497b5b514be0cadf81c739d89fbea472f5ae2f216255ebe7

  • SHA512

    a9d56d5be289112e8c35af5f99b28de88f8a0eef7d567926d10cfad0a62c57719f83eec6d066d8ac337eda624ff8e2d1c92a3720abe62b0135489b6fcac331a3

  • SSDEEP

    6144:S9k1/S4wVe34PFe6UyZtnl7Hse6UyZtncsLDcZbBy:ck1/SPrFntnlDseotnc2Dy

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:1952
    • C:\Users\Admin\AppData\Local\Temp\core_keygen.exe
      C:\Users\Admin\AppData\Local\Temp\core_keygen.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4992
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x504 0x4f0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\core_keygen.exe

    Filesize

    77KB

    MD5

    32548830857307e3137eeffa8accd38b

    SHA1

    9730ea50a858842f96bee154d05498dec9064a68

    SHA256

    8b70fec7c2302d2d84a2c4a12da9b5b2819bb0ffb579a8b55da67d36c8bed7ee

    SHA512

    5e773ada78c7492a178d2d23e9df53f45bc55dad3f0b7ee179266c92919fdc41e601983e4d7cde69094d5468ec41d1e0c434df20b5f529fb5f909eba172b0bf2

  • C:\Users\Admin\AppData\Local\Temp\nslADB6.tmp\NSISArray.dll

    Filesize

    19KB

    MD5

    14b848866035dea39b912da628307231

    SHA1

    d00c8963aee8038d8a22f098cef69b31007196e5

    SHA256

    6a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc

    SHA512

    4538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16

  • C:\Users\Admin\AppData\Local\Temp\nslADB6.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    168KB

    MD5

    d5889a5d5c2ddc54645a2838e83f957f

    SHA1

    58db610b9ab09e0b361455a7687b0d6b3a822dd5

    SHA256

    d7c6324c8db5372ab2422eea5a3bf25665d92af421e3bbe63aec7f2ba0cd571e

    SHA512

    0a3a53d1f473a6d31647afed30721e7eb2d54bc615f67d457f62a6dff8c8fa0ef2b035eeebf2ab03d053d370e778940e00e62c2fdb258d604f9b43182316ffe1

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    63ac5683c8f3b3e56d745fc5703447d2

    SHA1

    9f820feefe58177bfaea0721b10b44b9622473f7

    SHA256

    2b1e1f839137a4410387102d923d953f85a9edf9efd3cfa1b7989b4f4fdc2a6d

    SHA512

    633f48541e8d25a29ec70f192d145af0e067a5fc6db47aa00194861cdd923074b76d299a18e73cadc1ee5987a2f5bc2e147f181408c398bcf2e5f460a29b5b2a

  • C:\messenger.exe

    Filesize

    91KB

    MD5

    9247535b33135fb573a16b17beba7282

    SHA1

    8db9ac95226b3176a715533f933712e6212630e3

    SHA256

    2997c0be3cfc06d7953a3b7dda82e5b9333649ec8ff72c0df98703a0caa46a96

    SHA512

    01115dbf367137f416d580f4a95597ada82e0cbdf3819012cb8c9a2ba79d785774804f315016303170d0eb18aa457ca02442010ff4b89238d1690b611f449311

  • memory/1148-48-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4992-57-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-68-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-54-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-49-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-9-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-61-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-65-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-50-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-72-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-75-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-79-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-83-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-86-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-90-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-93-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/4992-97-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB