Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 11:00

General

  • Target

    JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd.exe

  • Size

    854KB

  • MD5

    a7f4b80020aeb7b9520a14d71db373fd

  • SHA1

    66d1f6d50510940ba6f3e16360df402300db2d88

  • SHA256

    7756fa478a5463d5abca6d3989c2c4251446803dc4ed1b0a9f69e60358f966cb

  • SHA512

    4e5b2a2ca18e3800c7681f80639955a017c3312e7f612880007f72e8603b24bbaa6fb4df5ecbc7503227ca99a795915dc8a89e141f2e87716e2a202f56dccdea

  • SSDEEP

    12288:ljeMYfumEQVCZ+03R7LpjR1qGd+N0+j6HurTik77nGJQWMpnXxcq029iA:lhNPj1pjR1qGN+j6G+OSe5pnXxb029

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 17 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\asdf.exe
      "C:\Users\Admin\AppData\Local\Temp\asdf.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1608
      • C:\Windows\SysWOW64\Netsh.exe
        "Netsh" Advfirewall set Currentprofile State off
        3⤵
        • Modifies Windows Firewall
        • Loads dropped DLL
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:4916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1016
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:840
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 496
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:912
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1220
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2512
    • C:\Users\Admin\AppData\Local\Temp\Furzmaschine Pro.exe
      "C:\Users\Admin\AppData\Local\Temp\Furzmaschine Pro.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\furtzpro.exe
        "C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\furtzpro.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2760
    • C:\Windows\SYSTEM32\Netsh.exe
      "Netsh" Advfirewall set Currentprofile State off
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:3884
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4916 -ip 4916
    1⤵
      PID:4232
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 840 -ip 840
      1⤵
        PID:4044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 912 -ip 912
        1⤵
          PID:3312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 912 -ip 912
          1⤵
            PID:4856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 912 -ip 912
            1⤵
              PID:4556
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 840 -ip 840
              1⤵
                PID:2680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 840 -ip 840
                1⤵
                  PID:5044
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4916 -ip 4916
                  1⤵
                    PID:1056
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2512 -ip 2512
                    1⤵
                      PID:3144
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2512 -ip 2512
                      1⤵
                        PID:4184
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2512 -ip 2512
                        1⤵
                          PID:4284

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\Furzmaschine Pro.exe

                          Filesize

                          492KB

                          MD5

                          7d232986f0c7a2dd9ea13a486b80f7d8

                          SHA1

                          87a69e35bf522e3fc9b457ae64bc68b9a5a816c7

                          SHA256

                          c1b363824f411c78259109f86f22da0847be527adc5012d466485c757fcded46

                          SHA512

                          b608a24f65ab1791ca8b162b7901f97be83dbefeada2ed5f08ec429d7b95e52129201cb11631ebb8bc4e03c74f2466db831c93a80961b3ad39c13d6dfcd3f050

                        • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\furtzpro.exe

                          Filesize

                          553KB

                          MD5

                          9d55b51dad288fc6e44e6983677c699d

                          SHA1

                          82754b94ea643314906ebb8941c91b0deaa41612

                          SHA256

                          82517e561ed54fcc47ae29e04c7cd2c16a6ab1ee50aead2c09dc85a67fa890e1

                          SHA512

                          ced36a803caf48be14423a070a0768b020a9fc17b12bfc8db91df789c5184dd4e4d215b6862b4e1cbdf560df64d4e63c8f6abbb599ce92662f49a7f72fa092eb

                        • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

                          Filesize

                          21KB

                          MD5

                          ac2d8c4a58be8a310cbb27e7a0e6ce6a

                          SHA1

                          4afce7899019de87021258f9e81240a5e0528966

                          SHA256

                          08aa4532aeb894a7014d15d829a255c7727369120e21d8653fd17144454bd650

                          SHA512

                          241b836ded1c958efc37d4511b988ab2c1753db1af053fc16e96ce3b8d08da7c3d17474d9d318cdf1b426c65ad61bc9a7fe2aceb51635e66274a8cb8a02d6af5

                        • C:\Users\Admin\AppData\Local\Temp\asdf.exe

                          Filesize

                          345KB

                          MD5

                          8d40a2c4e20621445c709f82df07877d

                          SHA1

                          0db949f3deef52224cdcc8b593c7ad1cbec38833

                          SHA256

                          f330acad894d76cb1e03ef09318884639089e85aa3a77156f5be62ca50dacdf0

                          SHA512

                          276f83522a847fb0169e994a9fdc7d473df73aa1283ab50561c470d99d7d88b71be9d051b31eb25ea08b5e14549b47120fc9f401d1637781ee1baee3b4e459bd

                        • C:\Users\Admin\AppData\Local\Temp\furzmaschine_v1_pro.ini

                          Filesize

                          583B

                          MD5

                          0798d7c257f6f2922d1b6b6da5824696

                          SHA1

                          9dadbc32af458e7ff9a4ff2cca5abe82be928ced

                          SHA256

                          6f823d3fffdf9137f7d393636fdee5ccb3aaa198f66c766cf4360a51338b2b35

                          SHA512

                          72fea39a2ea321b0c52ae4fe441ab8c744215f2d123e36fc377cfc3c3ea97555629c04cdf00f7d07f542eb475b867fcea08d93696ed6a0b7c814827e7833ba93

                        • memory/1608-94-0x00000000751E0000-0x0000000075791000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/1608-93-0x0000000004E40000-0x0000000004E50000-memory.dmp

                          Filesize

                          64KB

                        • memory/1608-84-0x00000000751E0000-0x0000000075791000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/1608-82-0x00000000751E0000-0x0000000075791000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/1608-53-0x00000000751E2000-0x00000000751E3000-memory.dmp

                          Filesize

                          4KB

                        • memory/1720-107-0x0000000000610000-0x0000000000620000-memory.dmp

                          Filesize

                          64KB

                        • memory/1720-106-0x0000000000400000-0x0000000000428000-memory.dmp

                          Filesize

                          160KB

                        • memory/1996-5-0x000000001B150000-0x000000001B158000-memory.dmp

                          Filesize

                          32KB

                        • memory/1996-7-0x000000001E440000-0x000000001E4A2000-memory.dmp

                          Filesize

                          392KB

                        • memory/1996-6-0x00007FFD6D520000-0x00007FFD6DEC1000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1996-85-0x00007FFD6D520000-0x00007FFD6DEC1000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1996-0-0x00007FFD6D7D5000-0x00007FFD6D7D6000-memory.dmp

                          Filesize

                          4KB

                        • memory/1996-4-0x000000001BC10000-0x000000001BCAC000-memory.dmp

                          Filesize

                          624KB

                        • memory/1996-3-0x000000001B6A0000-0x000000001BB6E000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1996-2-0x00007FFD6D520000-0x00007FFD6DEC1000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1996-1-0x00007FFD6D520000-0x00007FFD6DEC1000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2760-108-0x0000000000500000-0x0000000000510000-memory.dmp

                          Filesize

                          64KB