Analysis

  • max time kernel
    148s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 12:23

General

  • Target

    5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe

  • Size

    903KB

  • MD5

    5769f613b9098795f79b8eedcb864635

  • SHA1

    685a7fc226dc4e60daf8011cf92ee0143a65065e

  • SHA256

    a333f98a6636503dcf18047486bdd51a67b0addb1014b049362d5d0769f3cb4b

  • SHA512

    3f93c2e32895f4e3363a3ba72a5dd0857bac9d984155ece571444cbbc13eef315279dfb84689537a2f13a5e0706f15a44b82764eeb18b3c31d7f2a468d501921

  • SSDEEP

    12288:qk1/SPBZESknftnlARVptnjH1AkRRET0ZBT0Z:HSP/knftnlARVptnr1AkvEu

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:3568
    • C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe
      "C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /csfc /scannow
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Windows\system32\sfc.exe
          sfc /scannow
          4⤵
            PID:216
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /csfc /scannow
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4588
          • C:\Windows\system32\sfc.exe
            sfc /scannow
            4⤵
              PID:4504
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /csfc /scannow
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2292
            • C:\Windows\system32\sfc.exe
              sfc /scannow
              4⤵
                PID:3372
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /csfc /scannow
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1360
              • C:\Windows\system32\sfc.exe
                sfc /scannow
                4⤵
                  PID:3900
              • C:\Windows\SYSTEM32\cmd.exe
                "cmd.exe" /csfc /scannow
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1796
                • C:\Windows\system32\sfc.exe
                  sfc /scannow
                  4⤵
                    PID:3020
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /csfc /scannow
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2152
                  • C:\Windows\system32\sfc.exe
                    sfc /scannow
                    4⤵
                      PID:2944
                  • C:\Windows\SYSTEM32\cmd.exe
                    "cmd.exe" /csfc /scannow
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2720
                    • C:\Windows\system32\sfc.exe
                      sfc /scannow
                      4⤵
                        PID:4832
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /csfc /scannow
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4008
                      • C:\Windows\system32\sfc.exe
                        sfc /scannow
                        4⤵
                          PID:916
                      • C:\Windows\SYSTEM32\cmd.exe
                        "cmd.exe" /csfc /scannow
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3800
                        • C:\Windows\system32\sfc.exe
                          sfc /scannow
                          4⤵
                            PID:2972
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd.exe" /csfc /scannow
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3844
                          • C:\Windows\system32\sfc.exe
                            sfc /scannow
                            4⤵
                              PID:556
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /csfc /scannow
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2992
                            • C:\Windows\system32\sfc.exe
                              sfc /scannow
                              4⤵
                                PID:1284
                            • C:\Windows\SYSTEM32\cmd.exe
                              "cmd.exe" /csfc /scannow
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2140
                              • C:\Windows\system32\sfc.exe
                                sfc /scannow
                                4⤵
                                  PID:3892
                              • C:\Windows\SYSTEM32\cmd.exe
                                "cmd.exe" /csfc /scannow
                                3⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4704
                                • C:\Windows\system32\sfc.exe
                                  sfc /scannow
                                  4⤵
                                    PID:4972
                                • C:\Windows\SYSTEM32\cmd.exe
                                  "cmd.exe" /csfc /scannow
                                  3⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3636
                                  • C:\Windows\system32\sfc.exe
                                    sfc /scannow
                                    4⤵
                                      PID:2904
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    "cmd.exe" /csfc /scannow
                                    3⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2440
                                    • C:\Windows\system32\sfc.exe
                                      sfc /scannow
                                      4⤵
                                        PID:440
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      "cmd.exe" /csfc /scannow
                                      3⤵
                                        PID:1768
                                        • C:\Windows\system32\sfc.exe
                                          sfc /scannow
                                          4⤵
                                            PID:2496
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          "cmd.exe" /csfc /scannow
                                          3⤵
                                            PID:632
                                            • C:\Windows\system32\sfc.exe
                                              sfc /scannow
                                              4⤵
                                                PID:3180
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              "cmd.exe" /csfc /scannow
                                              3⤵
                                                PID:1864
                                                • C:\Windows\system32\sfc.exe
                                                  sfc /scannow
                                                  4⤵
                                                    PID:1812
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  "cmd.exe" /csfc /scannow
                                                  3⤵
                                                    PID:4372
                                                    • C:\Windows\system32\sfc.exe
                                                      sfc /scannow
                                                      4⤵
                                                        PID:3484
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      "cmd.exe" /csfc /scannow
                                                      3⤵
                                                        PID:164
                                                        • C:\Windows\system32\sfc.exe
                                                          sfc /scannow
                                                          4⤵
                                                            PID:3988
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          "cmd.exe" /csfc /scannow
                                                          3⤵
                                                            PID:1260
                                                            • C:\Windows\system32\sfc.exe
                                                              sfc /scannow
                                                              4⤵
                                                                PID:2420
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              "cmd.exe" /csfc /scannow
                                                              3⤵
                                                                PID:4464
                                                                • C:\Windows\system32\sfc.exe
                                                                  sfc /scannow
                                                                  4⤵
                                                                    PID:4324
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  "cmd.exe" /csfc /scannow
                                                                  3⤵
                                                                    PID:1752
                                                                    • C:\Windows\system32\sfc.exe
                                                                      sfc /scannow
                                                                      4⤵
                                                                        PID:608
                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                      "cmd.exe" /csfc /scannow
                                                                      3⤵
                                                                        PID:4824
                                                                        • C:\Windows\system32\sfc.exe
                                                                          sfc /scannow
                                                                          4⤵
                                                                            PID:2124

                                                                    Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe

                                                                            Filesize

                                                                            529KB

                                                                            MD5

                                                                            413d07016aba2a424318ebef82ff8a77

                                                                            SHA1

                                                                            2b0dea0d4c65f04eb3f8801b0c1d265effa139a2

                                                                            SHA256

                                                                            30283bea53bdb8e385af9467c27c45209fc2bc298a76242adf747bf843773d66

                                                                            SHA512

                                                                            0d8a8c265a882a09f3677cceade583aebd4b3e89996baa3f5413462e383e439adbc0b28c844805cc51f42572b0955a0ed46d001c377b8f40824bb77d4e92b401

                                                                          • C:\Users\Admin\AppData\Local\Temp\nsi80E9.tmp\NSISArray.dll

                                                                            Filesize

                                                                            19KB

                                                                            MD5

                                                                            14b848866035dea39b912da628307231

                                                                            SHA1

                                                                            d00c8963aee8038d8a22f098cef69b31007196e5

                                                                            SHA256

                                                                            6a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc

                                                                            SHA512

                                                                            4538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16

                                                                          • C:\Users\Admin\AppData\Local\Temp\nsi80E9.tmp\NSISdl.dll

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            a5f8399a743ab7f9c88c645c35b1ebb5

                                                                            SHA1

                                                                            168f3c158913b0367bf79fa413357fbe97018191

                                                                            SHA256

                                                                            dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

                                                                            SHA512

                                                                            824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                                            Filesize

                                                                            168KB

                                                                            MD5

                                                                            0c3f735c0cca87b1da6956b216288d1f

                                                                            SHA1

                                                                            9dda74e792329af180d4b4ca8e7bd611e020fa44

                                                                            SHA256

                                                                            4b4cbdc0ead3480f31b7fb54bad8dd5913f4cf9aaee6b44d349c2e27940ec5e5

                                                                            SHA512

                                                                            8fd47a669fdc01c1a24a94dada599f2f23a2213daf827b233c180d9ebc6e902261f365423ed4729c8401658d41e97e802f8ebc3e918321394986a0938a65b647

                                                                          • C:\messenger.exe

                                                                            Filesize

                                                                            91KB

                                                                            MD5

                                                                            e745b649add2a0363e0339a62a77d0d9

                                                                            SHA1

                                                                            4af3f9f46112563e90dd001afa1776b96fa205c7

                                                                            SHA256

                                                                            73be7f6ed8d8cfa79107e3fd90fdfaac397054ed4ffb64779fdac09aeabd9da6

                                                                            SHA512

                                                                            e200e2db300566f5161909670b8120c00d1c8e53309cdad7d5a1e380508155552449891c54e70929e700fde9bc1927ea33425cf5d9bed2fe2d8fb91978c9b64d

                                                                          • memory/3572-53-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                            Filesize

                                                                            404KB

                                                                          • memory/3656-21-0x0000000001500000-0x0000000001508000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/3656-14-0x00007FFEFB290000-0x00007FFEFBC31000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/3656-13-0x000000001C5F0000-0x000000001C68C000-memory.dmp

                                                                            Filesize

                                                                            624KB

                                                                          • memory/3656-12-0x000000001C120000-0x000000001C5EE000-memory.dmp

                                                                            Filesize

                                                                            4.8MB

                                                                          • memory/3656-11-0x00007FFEFB290000-0x00007FFEFBC31000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/3656-48-0x00007FFEFB290000-0x00007FFEFBC31000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/3656-49-0x00007FFEFB290000-0x00007FFEFBC31000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/3656-50-0x00007FFEFB545000-0x00007FFEFB546000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/3656-51-0x00007FFEFB290000-0x00007FFEFBC31000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/3656-52-0x00007FFEFB290000-0x00007FFEFBC31000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/3656-9-0x00007FFEFB545000-0x00007FFEFB546000-memory.dmp

                                                                            Filesize

                                                                            4KB