Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2024 14:06

General

  • Target

    e7a1c76348e312d3283a9ffd8d4666f8_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    e7a1c76348e312d3283a9ffd8d4666f8

  • SHA1

    0033583fab7f91bed1e98fa9f6fbca6194189861

  • SHA256

    42bade7a7d1828e0f9a35b471c9230439c518935ad6ca89ae6f9479966750f37

  • SHA512

    15ee4e43802280921ee053f634a0f6f5cb4bc4a4de547cd75557f90660dc82fb413103b7786d61635d8b933e9806d68752c897485da733d4087f5a3c2d8ea7c4

  • SSDEEP

    49152:OFUcx88PWPOpX0SFohtNjbTmWbGVdzIKJa4eR6OPgCj4kyGc:O+K88uPCHWWWbG/zF04eUOPgk4kyGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a1c76348e312d3283a9ffd8d4666f8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a1c76348e312d3283a9ffd8d4666f8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\518B.tmp
      "C:\Users\Admin\AppData\Local\Temp\518B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e7a1c76348e312d3283a9ffd8d4666f8_JaffaCakes118.exe 1595CF47BC906A15CB5BC3220ED57F06A63E1F274ACD50F259B8C698517BEEB21C4DB156C4792AEEA57DD10B70BCEA5F808EA1109BA045C1E730225B2E67F014
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e7a1c76348e312d3283a9ffd8d4666f8_JaffaCakes118.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\518B.tmp

    Filesize

    2.0MB

    MD5

    68266002dc2753a40dfb91f82614d363

    SHA1

    3c6cd77425eb9a4214f0231b372f8df5c4144cd1

    SHA256

    999f7ca4d2bf555b00fedc383c883da7eae439714b102c26e5ab0a87cbd37aa4

    SHA512

    7d662dd8281a46dbf3a0fee584ff4f4b129e6163cd1da61313f799d33e6c07988f7dbf884cc65aa5e97f6b2da889a06558808e435986a5df43d27f23895f489d

  • C:\Users\Admin\AppData\Local\Temp\e7a1c76348e312d3283a9ffd8d4666f8_JaffaCakes118.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/2308-5-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-18-0x00007FFB3AF10000-0x00007FFB3AF20000-memory.dmp

    Filesize

    64KB

  • memory/2880-20-0x00007FFB3AF10000-0x00007FFB3AF20000-memory.dmp

    Filesize

    64KB

  • memory/2880-13-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-12-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-14-0x00007FFB3AF10000-0x00007FFB3AF20000-memory.dmp

    Filesize

    64KB

  • memory/2880-15-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-17-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-38-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-19-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-11-0x00007FFB3AF10000-0x00007FFB3AF20000-memory.dmp

    Filesize

    64KB

  • memory/2880-16-0x00007FFB3AF10000-0x00007FFB3AF20000-memory.dmp

    Filesize

    64KB

  • memory/2880-21-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-22-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/2880-23-0x00007FFB38CB0000-0x00007FFB38CC0000-memory.dmp

    Filesize

    64KB

  • memory/2880-24-0x00007FFB38CB0000-0x00007FFB38CC0000-memory.dmp

    Filesize

    64KB

  • memory/2880-37-0x00007FFB7AE90000-0x00007FFB7B085000-memory.dmp

    Filesize

    2.0MB

  • memory/4836-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB