Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 19:27

General

  • Target

    b9cd9b89857de9e9226dcc8c4173c85e_JaffaCakes118.exe

  • Size

    822KB

  • MD5

    b9cd9b89857de9e9226dcc8c4173c85e

  • SHA1

    0e50b9b2681924a58fa50e00a10d1584b018bdd9

  • SHA256

    a852d02a9157ffda3feda83d70b5ae540658a28eac5b4b7c198ee7d5ca2a00a0

  • SHA512

    335d17802e1c9759edc9a88e4ed27aa5ad23f114b610296d1a0d9dda0fb10d52fc2c9cc24c18c70ce7add8ba0b6838137417f98611cbc12efa7a02166351b860

  • SSDEEP

    12288:lNldOGBTFbw0RJjJTQtOiQhjHfBHC9qISZKI54GqYdBKuf3NiAiSpb67GWoV87FY:floGBTL0szVi0IPI5dBKuvEVSQK984h

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9cd9b89857de9e9226dcc8c4173c85e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b9cd9b89857de9e9226dcc8c4173c85e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Users\Admin\AppData\Local\Temp\Server 2.exe
      "C:\Users\Admin\AppData\Local\Temp\Server 2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\hop.exe
        "C:\Windows\hop.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Windows\hop.exe" "hop.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2232
    • C:\Users\Admin\AppData\Local\Temp\ModHack_Avatariya.exe
      "C:\Users\Admin\AppData\Local\Temp\ModHack_Avatariya.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ModHack_Avatariya.exe

    Filesize

    932KB

    MD5

    0d254e04b3f1492e81b1742aa2233d0e

    SHA1

    8f59320b4bba2eb21a052b5289e6414fa7001665

    SHA256

    5eb796edb8a823917cc210d457a703542f90a60b99a673490103e107ab14893a

    SHA512

    a0adcc7a88b76f58c26eba18d3cd537cfd743cd19264793688595f22147e32ada561465aca4ca96d8b40643aa7b9d3d73151249f45d0662d3187764490b8fcbe

  • C:\Users\Admin\AppData\Local\Temp\Server 2.exe

    Filesize

    28KB

    MD5

    c5d2603a71a7aa7def701a294bffb84e

    SHA1

    de31d965aba753235a089e587e1e57db609b3b2b

    SHA256

    ece28e2e2b9cabea535f6aa027e18137b841c150bf45c9200398f669c3be3922

    SHA512

    6f72fdcd839bd3fad69eff25b047ac33e2ce3d9323d649f11c6bfd96c5e2250aa899e830f6e6bc998337e9e820830cd26f7ef1636967cd8fdcc3c619e514be75

  • memory/972-19-0x0000000073592000-0x0000000073593000-memory.dmp

    Filesize

    4KB

  • memory/972-31-0x0000000073590000-0x0000000073B41000-memory.dmp

    Filesize

    5.7MB

  • memory/972-32-0x0000000073590000-0x0000000073B41000-memory.dmp

    Filesize

    5.7MB

  • memory/972-42-0x0000000073590000-0x0000000073B41000-memory.dmp

    Filesize

    5.7MB

  • memory/3912-18-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/3912-43-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/3912-45-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB