Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 13:54

General

  • Target

    23ba6264867c529085c766f6b984db80_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    23ba6264867c529085c766f6b984db80

  • SHA1

    a5509ce39be3b00ce89fccc497cba46348648d3b

  • SHA256

    d69c7020eeb7de540f830d03515ec2250e38ea65d3d07c193cdceab91690352c

  • SHA512

    c8981dce82651071ce17351cc84d85ba5ead1a1c73bdc35311e705400c8a7b293360b9a6580b793b96c9b5f3bd5ce4e116cdd069bdd3d8f2191cf9c0ecba8a7f

  • SSDEEP

    3072:gbpfhDOW7hBhr4pX5r9x29E9z5HpZDGunCc9/0Q7BWDjIIO0r9bD6G:UJhBhrAXvQE9hPD7l08BkjIf0r9bWG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23ba6264867c529085c766f6b984db80_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23ba6264867c529085c766f6b984db80_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe
      \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE
        \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2532
    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE
      \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COM_LOADER /d "\\.\F:\Program Files\PDF_Reader\bin\COM7.EXE"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:524
      • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe
        \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1500
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2584 --field-trial-handle=3536,i,10914981530159316853,12381340356750224673,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE

      Filesize

      153KB

      MD5

      beb1d94050b54428e03464c90f466181

      SHA1

      9b9f90a1469e4b27955f63cf982bbd9627eaeeae

      SHA256

      956be1a44e0354109258ac3d33e58274b661250feacfe0e3f7b150c35ccfa99b

      SHA512

      4b725e780d50a9a4d819b9ee2937e5911cf9a48d4194ee1adfd65cc7c51a8090c5f51c97184a04829035904112006661fd4ca7c3876dae2368df6d8fd6792e86

    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe

      Filesize

      152KB

      MD5

      83731394f7d26f266ff2158d972b6281

      SHA1

      0d30ebbaee18431b6929edf4373b7772d2f6fd89

      SHA256

      46ee12d6a2e24f223fde780dda85388a66ddc2d6363179f2b15c91a3a350ea5f

      SHA512

      aae1f4c433fbf673abfb2ab618ee882b62980b17a6b417ba55cde8e33a42e6d815ad509c113c1930dfeb5db2d8f6f0244f4e42d84bd166424e3ccdc9693a1827

    • memory/1500-26-0x0000000000400000-0x0000000000549000-memory.dmp

      Filesize

      1.3MB

    • memory/1544-12-0x0000000000400000-0x0000000000549000-memory.dmp

      Filesize

      1.3MB

    • memory/2532-22-0x0000000000400000-0x0000000000549000-memory.dmp

      Filesize

      1.3MB

    • memory/2924-16-0x0000000000400000-0x0000000000549000-memory.dmp

      Filesize

      1.3MB

    • memory/2924-37-0x0000000000400000-0x0000000000549000-memory.dmp

      Filesize

      1.3MB

    • memory/4172-17-0x0000000000400000-0x0000000000549000-memory.dmp

      Filesize

      1.3MB