Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 04:12

General

  • Target

    e931a7648532915c19b2c953496fdbf7_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    e931a7648532915c19b2c953496fdbf7

  • SHA1

    0f90cd101d31f8258338232e4a4183cf3c78c821

  • SHA256

    067e2fa8d83c87959e8b99bbe246bd2867172faa2807b05d119e71e7d954d79b

  • SHA512

    ed13d52acd14f3bae9e29b888cb46e0073110c0bbf7202fe6c26d4ea2ed26fbeb90a52878279e276ae87e9f58853aa708f5be480a436e665567b89667f6597d9

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhZXdHHukP:hDXWipuE+K3/SSHgx3NHHnP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e931a7648532915c19b2c953496fdbf7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e931a7648532915c19b2c953496fdbf7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\DEM470B.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM470B.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Users\Admin\AppData\Local\Temp\DEM9E63.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM9E63.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Users\Admin\AppData\Local\Temp\DEMF4EF.exe
          "C:\Users\Admin\AppData\Local\Temp\DEMF4EF.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4768
          • C:\Users\Admin\AppData\Local\Temp\DEM4B7B.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM4B7B.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3008
            • C:\Users\Admin\AppData\Local\Temp\DEMA1F8.exe
              "C:\Users\Admin\AppData\Local\Temp\DEMA1F8.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:516
              • C:\Users\Admin\AppData\Local\Temp\DEMF855.exe
                "C:\Users\Admin\AppData\Local\Temp\DEMF855.exe"
                7⤵
                • Executes dropped EXE
                PID:452

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DEM470B.exe

          Filesize

          14KB

          MD5

          96728999121e4675189fb377a3e2a9ec

          SHA1

          b8e46e5bbabacd9efc53333ed3f05ca3ce143089

          SHA256

          0fb1ead7448bddb18bb113e5fb2c9be0ef026d9c63ab180282a09244b6cf0231

          SHA512

          013065ed8c24bd1104922c0a650cfc97ee472ab2aafe8339bbcab0d8832eda8ee1c06dab3aee2a109840b90a376c58a690a2aeaaebfc89b6c8093de13e86c13b

        • C:\Users\Admin\AppData\Local\Temp\DEM4B7B.exe

          Filesize

          14KB

          MD5

          af00fe43a612f5b327da091dfaa4249c

          SHA1

          090554769c5ad0f6710a2d55933aba18a3ca3045

          SHA256

          ede682f0dadf64db8597a7d1da15a959004399adcf78a3d2665af11e58190759

          SHA512

          8898fd070daca7cce0bc46c335f9e13c59f62bd3fba5bb76f0e3416da1552ee56b3a1ce3fe80076de3964b68fe2ad1d773fa367361bec9afe837873cd6b98b36

        • C:\Users\Admin\AppData\Local\Temp\DEM9E63.exe

          Filesize

          14KB

          MD5

          67bfdcf23a2d12aad39eda6c9122b5ad

          SHA1

          cac3a2c7868e55d6d1ba6d778a07fc3c24a4c74f

          SHA256

          502765a60a4a2c9411d784cc25200fb5db94f70edbf32a46a469cba88822b425

          SHA512

          88f0027016866b87f6f110bb8448387021d7b377f660206132de028820237d8023f27d5cbc54f58244f115f62de06c5a044931029fddd10681743b16368ed496

        • C:\Users\Admin\AppData\Local\Temp\DEMA1F8.exe

          Filesize

          14KB

          MD5

          0a6883f0785f5e9e1ea956d2d8c4f53f

          SHA1

          e666fd30bd19349836f148db3741618ee2806e21

          SHA256

          61276454daff8d87ed2e0770861c6730d53528b8587ed5c218e8908e9c84a62e

          SHA512

          6b2872698ae1ba7d7ea42b3a47f7a50d782176e9c6dffeb8958fac7a718c4ef338f8a31ba121bbffcc4e47064fe0f3b805c4e6250f79be0a892549dfc14c9840

        • C:\Users\Admin\AppData\Local\Temp\DEMF4EF.exe

          Filesize

          14KB

          MD5

          72c7c923c728e9776df64adda18fe569

          SHA1

          a5139f794c3d04da88dbf5ab74fb6df475d8d348

          SHA256

          415240eda36ba46a9c65dfe55659847f44449c94a01d34340628f4bb7291dcc1

          SHA512

          48faabfdac8a552af37ed5a82f3969189a0b6f529cbe50908dbb297746756b4b29d5ff932aac3080a8aa4aed8c009b8b125bc328a98b4d72e93f3ae389e13403

        • C:\Users\Admin\AppData\Local\Temp\DEMF855.exe

          Filesize

          14KB

          MD5

          797d19cbb2d831e12bb4b91e9b178f33

          SHA1

          23b707960623b2bb8411123ec523556a5e05485a

          SHA256

          0a0405e8009aed86160fbc69f84d2d75f7a21f90cf812270042900ec25c6b395

          SHA512

          e656b7db6997ca8387079d40e16a88145c7133c50557681d002b73defba64e2da3d29e2120ceb36b6dda50c49bbee7c85cdfb2d6c20b7d3207f2c479b9e8a99b