Analysis

  • max time kernel
    93s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 10:44

General

  • Target

    eb22dd8e4b78ddd44ceb9336e556ebd7_JaffaCakes118.msi

  • Size

    996KB

  • MD5

    eb22dd8e4b78ddd44ceb9336e556ebd7

  • SHA1

    c18c3f48bed890333ab98ae83241003db6b95c73

  • SHA256

    a38477583f2c2fd9b07c6c5ba26473893bfa3ff638abf760d933902eadcdcbc6

  • SHA512

    7ee234aa221f3bdd0095215eba0ed4666d7a1bd98fcf52eb7e3ce0f756d7ae3440ebf6c2b2626f2b519fc2374901ea6da3c540a501a61faa73d8d53fa3973b28

  • SSDEEP

    24576:Y7aBqnGIQ5M6DLrVVdWG859GCHrSoUzLyaVtFUl:Y78lrXVVdWX59GUrSLzeaVtFU

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\eb22dd8e4b78ddd44ceb9336e556ebd7_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3128
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 90EE1CBDDA554CA592A167DE00D070F7
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSIA354.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIA53C.tmp

    Filesize

    537KB

    MD5

    d7ec04b009302b83da506b9c63ca775c

    SHA1

    6fa9ea09b71531754b4cd05814a91032229834c0

    SHA256

    00c0e19c05f6df1a34cc3593680a6ab43874d6cd62a8046a7add91997cfabcd4

    SHA512

    171c465fe6f89b9e60da97896990d0b68ef595c3f70ee89b44fcf411352da22a457c41f7b853157f1faa500513419e504696775eefabe520f835ce9be5f4081c