Analysis

  • max time kernel
    102s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 05:14

General

  • Target

    2b8039c78c4dad17c2d0c342322f7680_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    2b8039c78c4dad17c2d0c342322f7680

  • SHA1

    0fa86493bbc6c05d2c643d0c329939368cb5c989

  • SHA256

    df27a81d101b133c0254000f3757a564c5a3a88e2bd6562d4af593a7b0e1c6f0

  • SHA512

    456c3203e8ad28f4e9342fc8128b1b3101ed90ab773eb86a49023d8c2275b608ddecc0e8af1f19db9939027327d3749c55509dcfc9ce53cc71233296d0cd8593

  • SSDEEP

    3072:gcD0SAY4yKdEvffYiihhnSBPKk4cGSgMpurEqDaB2Z+C:hDCWYii7nSBSk41SD4k2Z+

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b8039c78c4dad17c2d0c342322f7680_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2b8039c78c4dad17c2d0c342322f7680_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4572
    • C:\Windows\SysWOW64\sc.exe
      sc config wscsvc start= DISABLED
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4884
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2208
    • C:\Windows\SysWOW64\sc.exe
      sc config SharedAccess start= DISABLED
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4424
    • C:\Users\Admin\AppData\Roaming\8jll534.exe
      C:\Users\Admin\AppData\Roaming\8jll534.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Roaming\8jll534.exe
        C:\Users\Admin\AppData\Roaming\8jll534.exe -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
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1332
    • C:\Windows\SysWOW64\Rundll32.exe
      Rundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Windows\SysWOW64\runonce.exe
        "C:\Windows\system32\runonce.exe" -r
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:3728
        • C:\Windows\SysWOW64\grpconv.exe
          "C:\Windows\System32\grpconv.exe" -o
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4680
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\e6kd7gnc.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\8jll534.exe

    Filesize

    168KB

    MD5

    2b8039c78c4dad17c2d0c342322f7680

    SHA1

    0fa86493bbc6c05d2c643d0c329939368cb5c989

    SHA256

    df27a81d101b133c0254000f3757a564c5a3a88e2bd6562d4af593a7b0e1c6f0

    SHA512

    456c3203e8ad28f4e9342fc8128b1b3101ed90ab773eb86a49023d8c2275b608ddecc0e8af1f19db9939027327d3749c55509dcfc9ce53cc71233296d0cd8593

  • C:\Users\Admin\AppData\Roaming\e6kd7gnc.bat

    Filesize

    218B

    MD5

    0af0ae8b58d8dd9a1970c0b2c5fc4d07

    SHA1

    60c3066af5ad2dd0a9893d1cec817105260a0b7f

    SHA256

    d3a30aa9d61c46cf8c431c5ef3665cc6c10c4c20b213b6cd9fb4c836192bd8ef

    SHA512

    7044b55b000e15bccef9dca52e949baccbe03548d4456006c8b32b27508c03b80eb168f4a3606325e69c12519421a90b02424535b14553c3c9b6faed1c323575

  • C:\Users\Admin\AppData\Roaming\mdinstall.inf

    Filesize

    410B

    MD5

    3ccb3b743b0d79505a75476800c90737

    SHA1

    b5670f123572972883655ef91c69ecc2be987a63

    SHA256

    5d96bec9bc06fd8d7abc11efbb3cb263844ee0416910f63581dd7848b4e1d8dd

    SHA512

    09b1cdd4393f515f7569fbccc3f63051823ed7292b6e572bc9a34e4389b727b2914b22118e874864ccb32ef63016b2abd6d84510fd46fdee712fd84be59c114e