Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 12:49

General

  • Target

    6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe

  • Size

    6.2MB

  • MD5

    6252d21392e1917e0f3dceda06e3a995

  • SHA1

    62fb2c2db8e172106d59a53ac1c5a3c2f67169f4

  • SHA256

    d23d434b7c1f74517ebc2af362052adcb48344b9e55f64a4183883ed78b67b2d

  • SHA512

    a136098f4c5fd18bcdb7c776ac23826f7daf4aa855a31c33ea122c607c564f4154c371adf964ea14e2381cd01a8dac78ca48a4aac8645d9672e31584d1b6e8b6

  • SSDEEP

    98304:bh29rRyP4k6SnGbXeEmn42PlEbp2WWBJySiiusHTjB+DidXvh6d204OOR5qS:89EDQXeEz2t2mBvHTjOgJ6M8YY

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe" /VERYSILENT /SP-
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Users\Admin\AppData\Local\Temp\is-UKSG6.tmp\PlotterLib.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-UKSG6.tmp\PlotterLib.tmp" /SL5="$60250,2331902,780800,C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe" /VERYSILENT /SP-
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Users\Admin\AppData\Roaming\WinSpo\WCL.exe
          "C:\Users\Admin\AppData\Roaming\WinSpo\WCL.exe"
          4⤵
          • Executes dropped EXE
          PID:3480
        • C:\Users\Admin\AppData\Roaming\WinSpo\svschost.exe
          "C:\Users\Admin\AppData\Roaming\WinSpo\svschost.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:3452
    • C:\Users\Admin\AppData\Local\Temp\PlotManage.exe
      "C:\Users\Admin\AppData\Local\Temp\PlotManage.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4796
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 &Del "6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\system32\choice.exe
        choice /C Y /N /D Y /T 1
        3⤵
          PID:64

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotManager.exe

      Filesize

      3.2MB

      MD5

      6cf6e85c530e2f6d6e28aa066b19c29b

      SHA1

      679cd8304321ab4615793fa24449163fa044fe28

      SHA256

      760dbaef1a097bda49db17342e2bf27c334e3358a515dd53445b55cb01629a31

      SHA512

      08ba349dbba2fc7d0117d3422a66505c166b82b8f3ceff78e7ff1799f6cba1a71a275ea8d7ac9d326cd88528124f5820c7abc3ce01d48828394ad5b9276fbd8b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe

      Filesize

      3.0MB

      MD5

      725506d889dc290b57abee789f86d09e

      SHA1

      6239c0862a57a4a1859099a1fc6e70c52f3ee80e

      SHA256

      b61c57ff173e99dc83c2b4c300072d2b98f86271202ec05f5c94fbf218839507

      SHA512

      63a9f5a3f2f5d996a729cb0863ecf73aab4da047ef297483809113e367151974f8c27f958cd3ae867a179b2cdd4ecb6e4554fa649a395444d5f6226f5bf0ca4a

    • C:\Users\Admin\AppData\Local\Temp\is-UKSG6.tmp\PlotterLib.tmp

      Filesize

      2.9MB

      MD5

      669dc6230c96d8f4e1a831554f655427

      SHA1

      91e57ce09970cba73e638d60ef2faf8bd6aa39ba

      SHA256

      35a088a72be2d2aa9c8f2285fbcabb5893582d6bc2dd355b107da081c999db82

      SHA512

      4c6e4033b4287ba8efe3c1843dff0f2498e0ac53ee5993ad51a13879fb32ae65cc146cf25c1c716722c9b6b5affc6a1055939486a5ea2d46f4dfa8809b6489b8

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-0DFBV.tmp

      Filesize

      6KB

      MD5

      88b1dab8f4fd1ae879685995c90bd902

      SHA1

      3d23fb4036dc17fa4bee27e3e2a56ff49beed59d

      SHA256

      60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92

      SHA512

      4ea2c20991189fe1d6d5c700603c038406303cca594577ddcbc16ab9a7915cb4d4aa9e53093747db164f068a7ba0f568424bc8cb7682f1a3fb17e4c9ec01f047

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-2PDTL.tmp

      Filesize

      90KB

      MD5

      02b71d7f1eff7aa74b19969b4d2741b9

      SHA1

      8d625c3932b12859268149fa936ee6f607d03a65

      SHA256

      1774899128785abd6015c995316ea2adf26caaaf51825c290b1caf39ad91f5a7

      SHA512

      9092fec5f21f83bf4973d001662e73547c1b4b1cec0a1e55242ddfdca62706b885bb22f0d02b287c9e09641fbe6812cabfe16aa6d881705648cc847856522257

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-A9BOV.tmp

      Filesize

      3.6MB

      MD5

      21e49d937a929db0ff9c265e8b2b6777

      SHA1

      88000b29bb69b3e8a29f30f0274de3e71a8b7ef7

      SHA256

      9b760f2aa4576d044bcd33e21943a8cbccd9c56d17d598fa509213e05f9939c1

      SHA512

      165664b4d3b6aa2c481665a9aed572a7445cd32052066faf7bf05340820d8afc3cf4660a344d2a06e6f3bcabbfa7923eb61c39b7367735ede0f5154f9696d1bf

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-A9KRK.tmp

      Filesize

      386KB

      MD5

      4ae68042d513cba160cdaafe45d35582

      SHA1

      9a07ebd26fab57947b20647ac6ca0019475ffb44

      SHA256

      cc2b02ac7ed7656e4d26574367c571dfc44d3f167838f0ee868cdb8b493b3ff4

      SHA512

      b78f80697ba16c33ba9ede2d2019ceb6173c8a2d335d6990b75613c1af21669f25ea8f2d0e3c56af08578d038cf3b66ca4e55ca252ad699a805598993a3d5be8

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-CSKIG.tmp

      Filesize

      706B

      MD5

      812452fb7d6044657f21868f8b046ec8

      SHA1

      2a3d0cfa5ef48c687ed42c101c3466b8104379bf

      SHA256

      3a0fcc3de6f38f43bc68c3f7733470c5ae0ba7e44231f381a555c26f72cded2d

      SHA512

      ff72c6f6e830a34bcb84f44030568b709b422868d93a7ad0c12a2da1d7e1fdee6e048e23b90d87a0d98383d3964ab71d28db98f58ad381c93c06682ae1b4ec36

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-D8TRU.tmp

      Filesize

      319KB

      MD5

      bf9dd864f5822dc28ffce9529bae15ba

      SHA1

      ee578ba78ddaf0547edd23355dbc658cdc1b86ab

      SHA256

      74328f7f2d08cfc734cc5151bc68377962d1e0a75137908925a604b3d18b7be6

      SHA512

      ea00797c9e7117452e3a7f94db016e22dad0246c439daaae304ecfb5c5de19d2db0c63ce1edd135a409f07ba75b19bd6428a7ab6d80a9dc65ff473ff985ef43e

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-FLG6H.tmp

      Filesize

      6KB

      MD5

      0e486de290c0948cc69b74c1e1a8a8a0

      SHA1

      7cb150504196a8cb028f4ec23566cc0760fc72aa

      SHA256

      83db250a9a3ea0600dcdd18626b1069701731b99d39207822be8ccd72d311ef5

      SHA512

      e175d67da17523177deda8c4e77f213487956bf1783e3a2b576a6918572702343fbec7717711545410e4459aea2bd9a4a455365bba8a0d7afc07a0e47c35a250

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-GVERO.tmp

      Filesize

      328B

      MD5

      26e28c01461f7e65c402bdf09923d435

      SHA1

      1d9b5cfcc30436112a7e31d5e4624f52e845c573

      SHA256

      d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368

      SHA512

      c30ec66fecb0a41e91a31804be3a8b6047fc3789306adc106c723b3e5b166127766670c7da38d77d3694d99a8cddb26bc266ee21dba60a148cdf4d6ee10d27d7

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-HSSHC.tmp

      Filesize

      759KB

      MD5

      7aa3e993ffef3a554ebab6532eac4075

      SHA1

      92b541293c63a4fb343327a1cc7708f96e7eec74

      SHA256

      aaf5bd6cdf7eae9d3ed153033917b3aed750d48ab11222569246db162d94b72e

      SHA512

      97d91945d2f90594505ce67e2ce6f9bf4cfabe7ec5a0461ac5bf82c8bd1094308c99a02d4cc25276dc9701c8109afe1f69726964f2e06dce98f005f0e8f5ec49

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-MG98I.tmp

      Filesize

      59KB

      MD5

      1239f15c699caece7ae3b5d2d5cbe312

      SHA1

      3655b2fb3b1f94f2ca670c397d2b1d3b3f44c47e

      SHA256

      545e90e66968c26722b23a4cd67d1039027b60fc33a33d669a6de73dd5e6a0af

      SHA512

      ad0b98ce5633f8d42ead9719420481e9cb0ea0ee6bd38f660261e180425befd4bd7e7acace466c1e15e277b4d48274d0b480a92709529ae901f50e1a77a2f236

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-MSIDM.tmp

      Filesize

      85KB

      MD5

      08b0d2ee1c48e37aa2560cb5c1a327e0

      SHA1

      ea22db9932ba94b3775d3f3c5b07d451ab6105b1

      SHA256

      a199c6653726ba9e0cb9178af9691926c08667d451a3154b5966b2f22c24a64e

      SHA512

      785cb3a9ef2cce6afcc86f4d5205c14114040e89c4a9d6091dd9135be69fb62f58c1a0dc0657361c3c5bb3b1d94bf7a019c37fe20c2e53cf7814952fd43d9a67

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-MTIAB.tmp

      Filesize

      259B

      MD5

      ac5d5cc9acad4531ef1bd16145ea68bd

      SHA1

      f9d92f79a934815b645591ebbd6f5d20aa6a3e38

      SHA256

      68c787616681427557343e42ede5805dfbeeb580c59f69c4706b500f225e2c6b

      SHA512

      196863e039e9c83fb0f8eb3f0a6119db31a624e7ef4e9ba99516702e76796957f0ebf87e8728e1bd0de6cd7420bec6e644caa58a0724a7208e9a765d6eb78f64

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-NKTF3.tmp

      Filesize

      17KB

      MD5

      018b7364f4de19d99c37665eb8555fc5

      SHA1

      661d32b263131f27c890a3a17e3a7f58b0035f93

      SHA256

      fb68bf34ae44c30267e5034d65e7d917033631f8290a17de264de5189f1c9e71

      SHA512

      82eb86e58894d3beed9f7efefdd9f8ece4d4d1af7d95e8751054eac18ff8eb08e6bfdd0ccf132f666b2bdd47669fdc4b1fcf4c172a4cf3f25b0464e6943489f8

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-NLB4E.tmp

      Filesize

      46B

      MD5

      3be27483fdcdbf9ebae93234785235e3

      SHA1

      360b61fe19cdc1afb2b34d8c25d8b88a4c843a82

      SHA256

      4bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b

      SHA512

      edbe8cf1cbc5fed80fedf963ade44e08052b19c064e8bca66fa0fe1b332141fbe175b8b727f8f56978d1584baaf27d331947c0b3593aaff5632756199dc470e5

    • C:\Users\Admin\AppData\Roaming\WinDPD\is-SR1I6.tmp

      Filesize

      31KB

      MD5

      191bd0cc859e47aaa7c5195f58f56d4e

      SHA1

      c2d91b7688ab3d4fbc08dc8df895323ca2c47460

      SHA256

      3d30caf999bbd1c39b681f4782c2f703c02b9956c4a77d7d531e20ca02ffaa29

      SHA512

      9c876afdc1b3cab2c01d1d369d6c532edc4377876ed95f324e0e638860852d41052796a16f7314ef922bb7ff6edb9f3687f6edfb342b6524951906340c614b08

    • memory/2444-174-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/3456-29-0x0000000000401000-0x00000000004B7000-memory.dmp

      Filesize

      728KB

    • memory/3456-179-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/3456-26-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/3480-180-0x000001B56DB80000-0x000001B56DB88000-memory.dmp

      Filesize

      32KB

    • memory/4796-36-0x0000000008120000-0x00000000088F8000-memory.dmp

      Filesize

      7.8MB

    • memory/4796-183-0x00000000090B0000-0x00000000090EC000-memory.dmp

      Filesize

      240KB

    • memory/4796-189-0x0000000074D5E000-0x0000000074D5F000-memory.dmp

      Filesize

      4KB

    • memory/4796-157-0x0000000008B90000-0x0000000008C22000-memory.dmp

      Filesize

      584KB

    • memory/4796-155-0x0000000005C00000-0x0000000005C70000-memory.dmp

      Filesize

      448KB

    • memory/4796-31-0x0000000000FB0000-0x00000000012EA000-memory.dmp

      Filesize

      3.2MB

    • memory/4796-30-0x0000000074D5E000-0x0000000074D5F000-memory.dmp

      Filesize

      4KB

    • memory/4796-188-0x000000000C720000-0x000000000C728000-memory.dmp

      Filesize

      32KB

    • memory/4796-181-0x0000000008EF0000-0x0000000008FAA000-memory.dmp

      Filesize

      744KB

    • memory/4796-182-0x00000000099A0000-0x0000000009F44000-memory.dmp

      Filesize

      5.6MB

    • memory/4796-40-0x0000000005B60000-0x0000000005BB0000-memory.dmp

      Filesize

      320KB

    • memory/4796-184-0x000000000C6D0000-0x000000000C6D8000-memory.dmp

      Filesize

      32KB

    • memory/4796-185-0x000000000C740000-0x000000000C778000-memory.dmp

      Filesize

      224KB

    • memory/4796-186-0x000000000C6E0000-0x000000000C6EE000-memory.dmp

      Filesize

      56KB

    • memory/5052-1-0x000002BDD7A90000-0x000002BDD80CE000-memory.dmp

      Filesize

      6.2MB

    • memory/5052-0-0x00007FFA28463000-0x00007FFA28465000-memory.dmp

      Filesize

      8KB