Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 18:36

General

  • Target

    416e2b46a47c74d0ae1e75ac69aee03e_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    416e2b46a47c74d0ae1e75ac69aee03e

  • SHA1

    909ef0d9fc38c0900072e5d7ac3495f5d263e5e5

  • SHA256

    0e2ff7a0c75cddbe2570688ae3e8afff5b3c2cfa4521474943595a4d96e378a5

  • SHA512

    0bc2d8744663612a72bd2a3eb591acbc59e35093b239163f9689f4f306ce6052f25c3e47ca9f039e8941955d3c19480144618333fa2594e23e5524db72d9f675

  • SSDEEP

    12288:LHVOPAQj+bkTKTGPMnLeFv6G4lVl+unwsXp8rBrq1oOIKr5iBo+zSayUJHf78C2G:BOPf+jGPM99d5mkvprceuJHfZy0qU3

Malware Config

Signatures

  • Blocklisted process makes network request 10 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\416e2b46a47c74d0ae1e75ac69aee03e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\416e2b46a47c74d0ae1e75ac69aee03e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
      "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v WinDir /d "C:\WINDOWS\Media\wininnet.cpl" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k start C:\WINDOWS\Media\wininnet.cpl
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3808
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\WINDOWS\Media\wininnet.cpl",
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\WINDOWS\Media\wininnet.cpl",
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 2704
              6⤵
              • Program crash
              PID:3672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2964 -ip 2964
    1⤵
      PID:3828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

      Filesize

      490KB

      MD5

      722e46f7acdc9ad4b63bf416e9b0985b

      SHA1

      86cd18c974bc226e24576e13b1e10a1519d52f65

      SHA256

      e03039bc51b004ca869518e52b05d0eb21fd104e83657e70bcf6aa74674729e1

      SHA512

      84f3f8d0c1dee0d831435b83e4a124c5540781f8526b06d106a782568f148cc3d2d48c883bf3c4ecb6ae7d0fa69614216021e3d7d5b96cad61330ac6e44c6d16

    • C:\WINDOWS\Media\wininnet.cpl

      Filesize

      722KB

      MD5

      d04386e99e59fc97312de8cb0383a18c

      SHA1

      e421a922bd4aea728e5ac7e543bd60b7df282233

      SHA256

      2455d276552b74837007d6a3e9c92d3f27976235a0f9ec8edbff5c63136f9148

      SHA512

      47e94957a71205ee1a9d7bc1d30e8f4834e786d7ce9b8341b44100268a73b08f8e42de5623e1a95492c52da8e8c74a0a2efd0b6401b1ff336e900e518b17508e

    • memory/2476-16-0x0000000000400000-0x00000000005AF000-memory.dmp

      Filesize

      1.7MB

    • memory/2476-19-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/2476-55-0x0000000000400000-0x00000000005AF000-memory.dmp

      Filesize

      1.7MB

    • memory/2476-29-0x0000000000400000-0x00000000005AF000-memory.dmp

      Filesize

      1.7MB

    • memory/2476-24-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/2476-22-0x0000000000400000-0x00000000005AF000-memory.dmp

      Filesize

      1.7MB

    • memory/2964-112-0x0000000000400000-0x00000000004B9000-memory.dmp

      Filesize

      740KB

    • memory/2964-30-0x0000000000400000-0x00000000004B9000-memory.dmp

      Filesize

      740KB

    • memory/3204-7-0x000000001CA10000-0x000000001CA5C000-memory.dmp

      Filesize

      304KB

    • memory/3204-0-0x00007FFC0F675000-0x00007FFC0F676000-memory.dmp

      Filesize

      4KB

    • memory/3204-21-0x00007FFC0F3C0000-0x00007FFC0FD61000-memory.dmp

      Filesize

      9.6MB

    • memory/3204-2-0x00007FFC0F3C0000-0x00007FFC0FD61000-memory.dmp

      Filesize

      9.6MB

    • memory/3204-8-0x00007FFC0F3C0000-0x00007FFC0FD61000-memory.dmp

      Filesize

      9.6MB

    • memory/3204-1-0x000000001BCF0000-0x000000001BD96000-memory.dmp

      Filesize

      664KB

    • memory/3204-3-0x000000001C280000-0x000000001C74E000-memory.dmp

      Filesize

      4.8MB

    • memory/3204-6-0x000000001BDA0000-0x000000001BDA8000-memory.dmp

      Filesize

      32KB

    • memory/3204-5-0x000000001C8B0000-0x000000001C94C000-memory.dmp

      Filesize

      624KB

    • memory/3204-4-0x00007FFC0F3C0000-0x00007FFC0FD61000-memory.dmp

      Filesize

      9.6MB