Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 22:06

General

  • Target

    31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    31fff390b4cc19f4ca8d02f144a83b57

  • SHA1

    acb9c42c46abf42d45e05625ccd398a44a114d7b

  • SHA256

    a6b6337806bf52b04474c98ed8b0051d8b1949c11755966d233bf60854505583

  • SHA512

    9383ec427243058b82fffda7e4f9ec733cb9baae06cb6aafa97a66aa39c65454c423a33e65a265127eb2c6fa3d4c0cbeae3e3fc8b379ab4a1f0806ac5c7ecf14

  • SSDEEP

    24576:FbpadCJ8XnNbXUMCDouesiqN4AiJB3g791v4QDhlnOBvBO:RpadCJNbPiJBI94QDhlK5O

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Detected Nirsoft tools 7 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • System Binary Proxy Execution: InstallUtil 1 TTPs 2 IoCs

    Abuse InstallUtil to proxy execution of malicious code.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe"
    1⤵
    • System Binary Proxy Execution: InstallUtil
    • Checks computer location settings
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "HGDJDCBFJDJVCNDCVHDJHDJCHDNJVCHDFCNBXCHDCDHG" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "HGDJDCBFJDJVCNDCVHDJHDJCHDNJVCHDFCNBXCHDCDHG" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3856
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"
      2⤵
      • System Binary Proxy Execution: InstallUtil
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          • System Location Discovery: System Language Discovery
          PID:372
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:460
      • C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe
        "C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3856
        • C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe
          "C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\COPYRIGHT.exe.log

    Filesize

    1KB

    MD5

    7dca233df92b3884663fa5a40db8d49c

    SHA1

    208b8f27b708c4e06ac37f974471cc7b29c29b60

    SHA256

    90c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c

    SHA512

    d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07

  • C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe

    Filesize

    76KB

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.txt

    Filesize

    116B

    MD5

    b40ac3ef3c632cc210cbd5c2f73d4eca

    SHA1

    fabf16f2fa6964cf2ee3a42df39ac1269ac931f9

    SHA256

    cc4129149a073c9c4dc4e1bf41649c20f051f5481c6c3ee02fa157cfdb7b8d91

    SHA512

    5de8d3dcb51b3c12f8c0406caa3b2c56902053f4c274c3e8543f63557d9c65f19c316e76e3f947264ca872c9b392ba2f7800737ea3f697294c779efd1df76fd5

  • C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.txt

    Filesize

    119B

    MD5

    1d9d15ee7499c784917fb2a5511daa8d

    SHA1

    eefc14cc2e338d23ab44f10ff016662d8488c66c

    SHA256

    76bf15231510cbfc918296bb708ec39b71fa6ab378848a5a5ebafb6a734e8662

    SHA512

    d08791bd3fc4346db781fc21cce0b2cccbedccc188d7b1d07196041535e6b35060012734375d1a29801cb3569ce1ac66d20fd1d1c7881539a1eb98afe0bd87e7

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

    Filesize

    41KB

    MD5

    5d4073b2eb6d217c19f2b22f21bf8d57

    SHA1

    f0209900fbf08d004b886a0b3ba33ea2b0bf9da8

    SHA256

    ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3

    SHA512

    9ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159

  • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

    Filesize

    3KB

    MD5

    f94dc819ca773f1e3cb27abbc9e7fa27

    SHA1

    9a7700efadc5ea09ab288544ef1e3cd876255086

    SHA256

    a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

    SHA512

    72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe

    Filesize

    1.7MB

    MD5

    31fff390b4cc19f4ca8d02f144a83b57

    SHA1

    acb9c42c46abf42d45e05625ccd398a44a114d7b

    SHA256

    a6b6337806bf52b04474c98ed8b0051d8b1949c11755966d233bf60854505583

    SHA512

    9383ec427243058b82fffda7e4f9ec733cb9baae06cb6aafa97a66aa39c65454c423a33e65a265127eb2c6fa3d4c0cbeae3e3fc8b379ab4a1f0806ac5c7ecf14

  • memory/372-65-0x0000000000420000-0x00000000004E9000-memory.dmp

    Filesize

    804KB

  • memory/372-63-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/372-64-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/372-66-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/460-67-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/460-68-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/460-75-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1356-9-0x0000000006710000-0x0000000006732000-memory.dmp

    Filesize

    136KB

  • memory/1356-6-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1356-1-0x0000000000350000-0x0000000000508000-memory.dmp

    Filesize

    1.7MB

  • memory/1356-2-0x0000000005560000-0x0000000005B04000-memory.dmp

    Filesize

    5.6MB

  • memory/1356-3-0x0000000004EB0000-0x0000000004F42000-memory.dmp

    Filesize

    584KB

  • memory/1356-4-0x0000000004FB0000-0x0000000005304000-memory.dmp

    Filesize

    3.3MB

  • memory/1356-5-0x0000000005410000-0x00000000054AC000-memory.dmp

    Filesize

    624KB

  • memory/1356-26-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1356-7-0x0000000005530000-0x0000000005558000-memory.dmp

    Filesize

    160KB

  • memory/1356-8-0x0000000006750000-0x00000000067B6000-memory.dmp

    Filesize

    408KB

  • memory/1356-0-0x000000007474E000-0x000000007474F000-memory.dmp

    Filesize

    4KB

  • memory/1356-12-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1356-10-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1356-11-0x000000007474E000-0x000000007474F000-memory.dmp

    Filesize

    4KB

  • memory/2276-40-0x00000000052E0000-0x0000000005336000-memory.dmp

    Filesize

    344KB

  • memory/2276-62-0x00000000084F0000-0x00000000084F8000-memory.dmp

    Filesize

    32KB

  • memory/2276-39-0x0000000005040000-0x000000000504A000-memory.dmp

    Filesize

    40KB

  • memory/2276-34-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3856-53-0x0000000000F10000-0x0000000000F2A000-memory.dmp

    Filesize

    104KB

  • memory/4204-27-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/4204-32-0x0000000009840000-0x0000000009846000-memory.dmp

    Filesize

    24KB

  • memory/4204-31-0x0000000007210000-0x0000000007224000-memory.dmp

    Filesize

    80KB

  • memory/4204-30-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/4204-29-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/4204-28-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB