Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-04-2024 12:38

General

  • Target

    e28ef345a79740d76e2a1cee292e4c75_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    e28ef345a79740d76e2a1cee292e4c75

  • SHA1

    e4aac6062af45f5b03c0642bbd5f31d7cebac6a5

  • SHA256

    10de7fcb912db00e42000522e1ce05c54d6e8df01874125314b4b6bf68ce4cb5

  • SHA512

    c8c2ffc51d4392c1d7b81be9af045cd72ef40bab2bb3e343ad38cf0ad4dfe576075f13b3c9404ec887e4ecc46f2dc30e8387eadc5ec317a8af7a7e86ada33b0b

  • SSDEEP

    49152:rG9cVgsLdtm9Ul9k9VnUmuzs9m4r3Mz2VvYbeEoKXXfPPlWE5:rwMgtUl9UAOhEoYXfnlWE5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e28ef345a79740d76e2a1cee292e4c75_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e28ef345a79740d76e2a1cee292e4c75_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\h909z96f0636opj.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\h909z96f0636opj.exe" -e -ps7ile3bq92650zj
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\22139ip06107dpv.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX1\22139ip06107dpv.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Users\Admin\AppData\Roaming\Protector-eksn.exe
          C:\Users\Admin\AppData\Roaming\Protector-eksn.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4696
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\22139I~1.EXE" >> NUL
          4⤵
            PID:5116

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\h909z96f0636opj.exe
      Filesize

      1.9MB

      MD5

      a52857b4dad31854cc791524713b5f70

      SHA1

      d7326cd1e4c155d7dd10055952c2fa3702fcd91d

      SHA256

      b8dbc9c3e64b7b8024340441c380371740bdd87812c6828b76a686be9824e65c

      SHA512

      15d6d6f9c6e0efe31ac520622ea717b974876cc1401ea152afee4707f3fb7b60860d6a522e3ff0927bdba1e79407a2ab75a3faf5a88a1b20dd21377998d3781b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\22139ip06107dpv.exe
      Filesize

      1.9MB

      MD5

      5ecce49f7de9af90b9a26c276809f504

      SHA1

      f93ed10de32b844c9ee86a53c503419e14e25ed2

      SHA256

      eb579aa9b6523ba7db0fe6f7496523fce227b233929be0ad3c1acd0646a1754c

      SHA512

      f419a507d39e3c9cd6a984b6fa6450ffd6fd5de8b72221d2640cca10ef9a14d04509c53eb31b5e1aae6a984ae8df464cbd45f1f6b8b2ca55478628876c9265ba

    • memory/1176-35-0x0000000000870000-0x0000000000871000-memory.dmp
      Filesize

      4KB

    • memory/1176-23-0x0000000002690000-0x0000000002691000-memory.dmp
      Filesize

      4KB

    • memory/1176-36-0x0000000003530000-0x0000000003531000-memory.dmp
      Filesize

      4KB

    • memory/1176-24-0x0000000002680000-0x0000000002681000-memory.dmp
      Filesize

      4KB

    • memory/1176-25-0x0000000002670000-0x0000000002671000-memory.dmp
      Filesize

      4KB

    • memory/1176-26-0x00000000026E0000-0x00000000026E1000-memory.dmp
      Filesize

      4KB

    • memory/1176-27-0x00000000026B0000-0x00000000026B1000-memory.dmp
      Filesize

      4KB

    • memory/1176-28-0x0000000002700000-0x0000000002701000-memory.dmp
      Filesize

      4KB

    • memory/1176-29-0x0000000003500000-0x0000000003501000-memory.dmp
      Filesize

      4KB

    • memory/1176-30-0x00000000034F0000-0x00000000034F3000-memory.dmp
      Filesize

      12KB

    • memory/1176-31-0x0000000003540000-0x0000000003541000-memory.dmp
      Filesize

      4KB

    • memory/1176-32-0x00000000034E0000-0x00000000034E2000-memory.dmp
      Filesize

      8KB

    • memory/1176-33-0x0000000003550000-0x0000000003551000-memory.dmp
      Filesize

      4KB

    • memory/1176-34-0x0000000000850000-0x0000000000851000-memory.dmp
      Filesize

      4KB

    • memory/1176-21-0x0000000000400000-0x0000000000807000-memory.dmp
      Filesize

      4.0MB

    • memory/1176-22-0x00000000024D0000-0x000000000252A000-memory.dmp
      Filesize

      360KB

    • memory/1176-37-0x0000000003520000-0x0000000003521000-memory.dmp
      Filesize

      4KB

    • memory/1176-38-0x0000000003510000-0x0000000003511000-memory.dmp
      Filesize

      4KB

    • memory/1176-39-0x00000000027C0000-0x00000000027C1000-memory.dmp
      Filesize

      4KB

    • memory/1176-51-0x0000000000400000-0x0000000000807000-memory.dmp
      Filesize

      4.0MB

    • memory/1176-53-0x00000000024D0000-0x000000000252A000-memory.dmp
      Filesize

      360KB

    • memory/4696-46-0x0000000003540000-0x0000000003541000-memory.dmp
      Filesize

      4KB

    • memory/4696-47-0x00000000037A0000-0x00000000037A1000-memory.dmp
      Filesize

      4KB

    • memory/4696-48-0x0000000000400000-0x0000000000807000-memory.dmp
      Filesize

      4.0MB

    • memory/4696-50-0x0000000003520000-0x0000000003522000-memory.dmp
      Filesize

      8KB

    • memory/4696-49-0x0000000003580000-0x0000000003581000-memory.dmp
      Filesize

      4KB

    • memory/4696-54-0x00000000023B0000-0x000000000240A000-memory.dmp
      Filesize

      360KB

    • memory/4696-45-0x00000000023B0000-0x000000000240A000-memory.dmp
      Filesize

      360KB

    • memory/4696-44-0x0000000000400000-0x0000000000807000-memory.dmp
      Filesize

      4.0MB

    • memory/4696-52-0x0000000003590000-0x0000000003591000-memory.dmp
      Filesize

      4KB