Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250502-en
  • resource tags

    arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/05/2025, 05:37

General

  • Target

    JaffaCakes118_01a93ef53355330ab4105c860f9f76a8.exe

  • Size

    4.8MB

  • MD5

    01a93ef53355330ab4105c860f9f76a8

  • SHA1

    b1e1369278ff88958edfde04a31e729a12772118

  • SHA256

    facc6089e5bdd7363863e9d7426ad6de5fd94295affce870e065cd5a206ac76a

  • SHA512

    6d5e2a6c68cf838655eed700f05d639d1c0a316ce738ef82351675aec594fd2368fb2357797bee63b2162e8fed25d85c32d29c00c88c84e9bdcc2c15b3fbe4f7

  • SSDEEP

    98304:YWrSa24w3rQ/pE/JFBCnpcYiKAEXXPnsNSkUe:Ty4wesJFqpc8dXfUSe

Malware Config

Signatures

  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 17 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01a93ef53355330ab4105c860f9f76a8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01a93ef53355330ab4105c860f9f76a8.exe"
    1⤵
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4360
    • C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe
      C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe 0011 user01
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        3⤵
          PID:5116
        • C:\Users\Admin\AppData\Roaming\1746941848818.exe
          "C:\Users\Admin\AppData\Roaming\1746941848818.exe" /sjson "C:\Users\Admin\AppData\Roaming\1746941848818.txt"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2064
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe"
          3⤵
            PID:2364
          • C:\Users\Admin\AppData\Roaming\1746941850256.exe
            "C:\Users\Admin\AppData\Roaming\1746941850256.exe" /sjson "C:\Users\Admin\AppData\Roaming\1746941850256.txt"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2468
          • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
            C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:688
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:1600
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:784
        • C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe
          C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe 200 user01
          2⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops Chrome extension
          • Writes to the Master Boot Record (MBR)
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          • Suspicious use of WriteProcessMemory
          PID:2304
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c taskkill /f /im chrome.exe
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5032
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im chrome.exe
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:5884
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:5844
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3480
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01a93ef53355330ab4105c860f9f76a8.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:3896
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 3
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:5184
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5704
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 110684411B68ECC0F177A518F3100DD1 C
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1856
        • C:\Windows\system32\srtasks.exe
          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
          2⤵
            PID:1796
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          PID:1912

        Network

              MITRE ATT&CK Enterprise v16

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Config.Msi\e5819fc.rbs

                Filesize

                9KB

                MD5

                a7172a3c28219d6a6821eed51ed6ab9b

                SHA1

                9861b271e7838f208b87890756eb581ed48a11ee

                SHA256

                7055a5543ff61431338723150ad041cdd4e574af7f1067034c75e3f670097edc

                SHA512

                101e0d157ffdc01bbcfd814796cfb88f773a995bf0f845b83c61614eec383c444eee0310b01eb256217e859ca71768cfddd7057b2e8c79bc87fb3eb340c5c5b2

              • C:\Users\Admin\AppData\Local\Login Data1746941850224

                Filesize

                40KB

                MD5

                dfd4f60adc85fc874327517efed62ff7

                SHA1

                f97489afb75bfd5ee52892f37383fbc85aa14a69

                SHA256

                c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e

                SHA512

                d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4

              • C:\Users\Admin\AppData\Local\Login Data1746941850240

                Filesize

                56KB

                MD5

                0e2c60740cafa19c5158f4aa41a5d4e7

                SHA1

                f01d0f359e407fed424c30919ed64b77508b3024

                SHA256

                ce41f2a3255df2099ae8eea9364bd28c6fd6a56c8ca3290bd274944d16d9e6bf

                SHA512

                e367b88f1d984f84b9b4a8fa4002ede1afad0d375f9374636250f17e64445a60d1b99fe23a0b314c4b2bd5fd27fe5b87fa4079a84b4497629f238afd8436afe2

              • C:\Users\Admin\AppData\Local\Temp\6272167835D47591.exe

                Filesize

                4.8MB

                MD5

                01a93ef53355330ab4105c860f9f76a8

                SHA1

                b1e1369278ff88958edfde04a31e729a12772118

                SHA256

                facc6089e5bdd7363863e9d7426ad6de5fd94295affce870e065cd5a206ac76a

                SHA512

                6d5e2a6c68cf838655eed700f05d639d1c0a316ce738ef82351675aec594fd2368fb2357797bee63b2162e8fed25d85c32d29c00c88c84e9bdcc2c15b3fbe4f7

              • C:\Users\Admin\AppData\Local\Temp\MSI88D7.tmp

                Filesize

                6KB

                MD5

                84878b1a26f8544bda4e069320ad8e7d

                SHA1

                51c6ee244f5f2fa35b563bffb91e37da848a759c

                SHA256

                809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444

                SHA512

                4742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549

              • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe

                Filesize

                71KB

                MD5

                f0372ff8a6148498b19e04203dbb9e69

                SHA1

                27fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8

                SHA256

                298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf

                SHA512

                65d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865

              • C:\Users\Admin\AppData\Local\Temp\gdiview.msi

                Filesize

                231KB

                MD5

                7cc103f6fd70c6f3a2d2b9fca0438182

                SHA1

                699bd8924a27516b405ea9a686604b53b4e23372

                SHA256

                dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1

                SHA512

                92ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128

              • C:\Users\Admin\AppData\Roaming\1746941848818.exe

                Filesize

                101KB

                MD5

                ef6f72358cb02551caebe720fbc55f95

                SHA1

                b5ee276e8d479c270eceb497606bd44ee09ff4b8

                SHA256

                6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                SHA512

                ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

              • C:\Users\Admin\AppData\Roaming\1746941848818.txt

                Filesize

                5KB

                MD5

                0afcd19de4269e4cb19695794b35f71f

                SHA1

                73915c911a36aad3f8e0297731101beeca6fb9b0

                SHA256

                e3b880ffa4e420f523edf299e6126d3ea11cc9a26bd1137d5b6469e8b88d72ce

                SHA512

                be4044a653b1877d85fadd206512274f7a3d2d839ea5060422527eface93be347d2fac31653fbf71508392d1258f41d38f7a07d85c72fad77819bb263ea2d0a1

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\783erq3o.Admin\storage\default\moz-extension+++c9cdd9b2-a8a6-4f4c-8167-86f19e1820e6^userContextId=4294967295\idb\3647222921wleabcEoxlt-eengsairo.sqlite

                Filesize

                48KB

                MD5

                2eab03c24e521ee22c08a3e3bab16d7f

                SHA1

                d8ea20c5d4e7866c66ef36201e27fce4e10ad12b

                SHA256

                5c1fffc1e126ebbc19e4ef0cff60d5a0278cc57868737157746827acf7248ba2

                SHA512

                916cefe311d2b01d58062a022f5172880bd99c817b421f354a75a5c09e013676da7e2c16f333f1be121d62cb848b9739b0f2c4d2f45c56789574b93a97c7685b

              • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                Filesize

                24.6MB

                MD5

                75c9bb9476e2e0f82572d42cc4782799

                SHA1

                ea5bf968fd489312019ddf8b5f54ec52cf08717a

                SHA256

                e7967abf21d38c1e047fa865660f477411c302241ba12c4d8a5fe263e0f63f51

                SHA512

                5c6700baf094a410298195929bbd81e458e5c09f47499701e6308fcd7aef529bb2a6b7c2c062c7aeae4b220a0cb190760ddec0db06c9fd10dd92c0c4e97ecb36

              • \??\Volume{f8291350-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c634fcc3-4ff0-449a-847a-6b8a1540ac08}_OnDiskSnapshotProp

                Filesize

                6KB

                MD5

                a363c5d1407684d0b345282ae8efda7c

                SHA1

                3bcf8ece98090a1e1d3b0d4b2df2add46a4ac4e5

                SHA256

                88d4266ef373d0b382e24708666be0a6f22c6dd64818d917e71a5891a409f073

                SHA512

                0a727c80a06787f29ea9930ebda7d2babe76d92ca3d49d8e0049f605b22f6bd7b51d1889342442107ba35f7440135cc94dc204d15e1550ac6bdc0970ac2270e6

              • memory/704-30-0x0000000002FB0000-0x000000000345F000-memory.dmp

                Filesize

                4.7MB

              • memory/704-156-0x0000000000400000-0x0000000000590000-memory.dmp

                Filesize

                1.6MB

              • memory/2304-26-0x0000000003000000-0x00000000034AF000-memory.dmp

                Filesize

                4.7MB

              • memory/2304-16-0x0000000010000000-0x000000001033C000-memory.dmp

                Filesize

                3.2MB

              • memory/2304-128-0x0000000000400000-0x0000000000590000-memory.dmp

                Filesize

                1.6MB

              • memory/4028-0-0x0000000000400000-0x0000000000590000-memory.dmp

                Filesize

                1.6MB

              • memory/4028-13-0x0000000000400000-0x0000000000590000-memory.dmp

                Filesize

                1.6MB

              • memory/4028-1-0x0000000010000000-0x000000001033C000-memory.dmp

                Filesize

                3.2MB

              OSZAR »