Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 08:25

General

  • Target

    ce839fbfcd6fed956847acaef0f4514b_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    ce839fbfcd6fed956847acaef0f4514b

  • SHA1

    329fa422531a48ccb1236db9cc5b54f60bdd8f56

  • SHA256

    70976fddd1bbd74cd883fff72ead6e790f55e51dc700d70a2026c7bf20f63f25

  • SHA512

    f9cd6477442951e5ac0053a3c78343aba0ca492b98034d0336b4b866519b646504141f8565d4803f2f4c0017a2862623b0ec6156a5a7c53c2ee8861ec222b93b

  • SSDEEP

    49152:OFUcx88PWPOpX0SFCfKCaOYA2moyHEaU0FsyADiHQxyGc:O+K88uPCHNOYnTyaKHQxyGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce839fbfcd6fed956847acaef0f4514b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce839fbfcd6fed956847acaef0f4514b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\6D02.tmp
      "C:\Users\Admin\AppData\Local\Temp\6D02.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ce839fbfcd6fed956847acaef0f4514b_JaffaCakes118.exe 4FD5FA5B747D9060470DCB5E7454FDF3759142EF76CA130FF049CE3FE525772F23679AA72846D430AE40CD6CE16C53BCDC5746B3AE37F368BA4AF4CBE3DEB788
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3796
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ce839fbfcd6fed956847acaef0f4514b_JaffaCakes118.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:5024

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6D02.tmp

          Filesize

          2.0MB

          MD5

          3945ec68c366f5aa067e38335cb4cb5a

          SHA1

          a7ae408106bbdb17f202cba21fb53fa7136e3b72

          SHA256

          2d1bbada54d59dd3b7e4798ea918c9e756c4274b85ce77af3fa2b4a496f2b3ca

          SHA512

          73729254f3d2867cebcf61862081fdf68b912080fa0bad9aa09af2a52c15631b539e0f6ada976511f3ee90e7ad45dbe7530bfca51ab4bf0a0afe114d1f174ee7

        • C:\Users\Admin\AppData\Local\Temp\ce839fbfcd6fed956847acaef0f4514b_JaffaCakes118.docx

          Filesize

          19KB

          MD5

          4046ff080673cffac6529512b8d3bdbb

          SHA1

          d3cbc39065b7a55e995fa25397da2140bdac80c1

          SHA256

          f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

          SHA512

          453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

        • memory/1472-0-0x0000000000400000-0x0000000000606000-memory.dmp

          Filesize

          2.0MB

        • memory/3796-5-0x0000000000400000-0x0000000000606000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-17-0x00007FFE0AF10000-0x00007FFE0AF20000-memory.dmp

          Filesize

          64KB

        • memory/5024-22-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-14-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-13-0x00007FFE0AF10000-0x00007FFE0AF20000-memory.dmp

          Filesize

          64KB

        • memory/5024-15-0x00007FFE0AF10000-0x00007FFE0AF20000-memory.dmp

          Filesize

          64KB

        • memory/5024-16-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-18-0x00007FFE0AF10000-0x00007FFE0AF20000-memory.dmp

          Filesize

          64KB

        • memory/5024-19-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-11-0x00007FFE0AF10000-0x00007FFE0AF20000-memory.dmp

          Filesize

          64KB

        • memory/5024-20-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-21-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-12-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-23-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-24-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-25-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-26-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-27-0x00007FFE08EB0000-0x00007FFE08EC0000-memory.dmp

          Filesize

          64KB

        • memory/5024-28-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-29-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-30-0x00007FFE08EB0000-0x00007FFE08EC0000-memory.dmp

          Filesize

          64KB

        • memory/5024-43-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB

        • memory/5024-44-0x00007FFE4AE90000-0x00007FFE4B085000-memory.dmp

          Filesize

          2.0MB