Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 08:36

General

  • Target

    2e06da81ef1e43324d41019feffd94b6_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    2e06da81ef1e43324d41019feffd94b6

  • SHA1

    dcb236c4023a2a9bc52ce8ee4af1e7907f9e2786

  • SHA256

    0eb4db9b2f572c0921a567227cc07cd4d67c7649196d1b5820d2bc5a185061d6

  • SHA512

    b64ead8ce43fcbfc1564afd34cd44109c5d2485769c6b98022b8dc93e56207066db5d9b58e2a4cbe0c78c278ca192a7ac3480481bedde4818c3f27893a04afca

  • SSDEEP

    3072:P7fKMePXVLMRmN1qlaTyAAnNRACnnnmqOYJWn88nnH6nn5SnnbldcPu1+d:zKvPXVTGnNRACnnnLWn88nnH6nn5Snnu

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e06da81ef1e43324d41019feffd94b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e06da81ef1e43324d41019feffd94b6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create pmxviceo32 type= share start= auto DisplayName= "Visioneer Device Micro Driver DLL" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\pmxviceo32.dll,yloc"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1868
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description pmxviceo32 "Visioneer Device Micro Driver DLL"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1804
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall add portopening TCP 1659 messenger
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2164
    • C:\Users\Admin\AppData\Local\Temp\eb7edd97.exe
      "C:\Users\Admin\AppData\Local\Temp\eb7edd97.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4108
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x404 0x4c8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eb7edd97.exe

    Filesize

    47KB

    MD5

    0556622e82d0bf6fdc45cc90b68ff494

    SHA1

    1c70fc0836da64d9714789b57d92edfa0ac7a39e

    SHA256

    3d40fa67ae04cdfdf2f0c05c6005bdcdbfd400815c337b6e3cb2d4f518a24174

    SHA512

    4abfbb324edb7f9a391c592953e88555e9dbf4db8b266eabad921332e4584fff793f627085c8a61521ee26b2e7ee608f3a64b387fe5049a3c7a19c50598dfdb8

  • memory/4108-23-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-26-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-33-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-19-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-20-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-21-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-22-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-32-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-16-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-24-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-25-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-27-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-28-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-29-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-30-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4108-31-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4388-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4388-17-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB