Analysis

  • max time kernel
    135s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 07:50

General

  • Target

    e980c31b58b67d1974c265d452b41b1d_JaffaCakes118.exe

  • Size

    1000KB

  • MD5

    e980c31b58b67d1974c265d452b41b1d

  • SHA1

    79e3481a92d8d7262fd525fa35673b84454a0471

  • SHA256

    40b8c88a2bd6a10bb20d43efcc1d9e9c7a2ae7aa16bb72bc5a89a71076ba46ff

  • SHA512

    8588e6b33c53267a76468dcb21dc2e8fef2a1afdcb44a30c2d45c2c9a9d53ed1e303330161c2d5743f5a172aca1186cc8cd7dee62dd0b4d1e3bd7bec4b15c789

  • SSDEEP

    24576:LwIjc//////YhXrZb+qbz81Fkkv5fx/ClxRJ8r627CzO6kdlVE:8Sc//////YhXrt+qFiDwFU7CpklVE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e980c31b58b67d1974c265d452b41b1d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e980c31b58b67d1974c265d452b41b1d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\ScreenBlazeUpgrader.bat
      2⤵
        PID:1728
      • C:\Windows\ScrBlaze.scr
        "C:\Windows\ScrBlaze.scr" /S
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3908
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\ScreenBlazeUpgrader.bat
          3⤵
            PID:2288
      • C:\Windows\ScrBlaze.scr
        C:\Windows\ScrBlaze.scr /s
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3464
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\ScreenBlazeUpgrader.bat
          2⤵
            PID:1416

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\ScrBlaze.scr

          Filesize

          1000KB

          MD5

          e980c31b58b67d1974c265d452b41b1d

          SHA1

          79e3481a92d8d7262fd525fa35673b84454a0471

          SHA256

          40b8c88a2bd6a10bb20d43efcc1d9e9c7a2ae7aa16bb72bc5a89a71076ba46ff

          SHA512

          8588e6b33c53267a76468dcb21dc2e8fef2a1afdcb44a30c2d45c2c9a9d53ed1e303330161c2d5743f5a172aca1186cc8cd7dee62dd0b4d1e3bd7bec4b15c789

        • C:\Windows\ScreenBlazeUpgrader.bat

          Filesize

          251B

          MD5

          1b6947de66aa77bb45467cbf8a954d57

          SHA1

          150df7d37acda9be67f356366ebe5c86f4e2e736

          SHA256

          8cb979326e5abd04737cee99e2e116567d9da9ef45b5b2008cb47ed3bc1f5e91

          SHA512

          4af58804e62e7b97c7ee5fada4cbdf40d7c88b3696c2f15f1d50cee33fb34543f6425eb9e52cfbb2720f6798ca5dae2ed11f2427e6ece03c59fdf3d336dbbd70

        • C:\Windows\ScreenBlazeUpgrader.bat

          Filesize

          495B

          MD5

          34de790f23b844eeb353591c54f7fcfb

          SHA1

          1fba489a1df0caed474f0bf983b5551129335993

          SHA256

          b76c214f45511c48192e2303a3c86e0a393103dfd21b46d8514d432bc020f825

          SHA512

          01dd1108509ba287dabf90530c85b5ffb3bbf80fbbe0e97385b2270acc1c06828f5c8e752b017dc92d4bd784bd1659077f562682883417637019a3a5ea8686f9

        • memory/1592-0-0x00000000023A0000-0x00000000023A1000-memory.dmp

          Filesize

          4KB

        • memory/1592-32-0x0000000000400000-0x0000000000503000-memory.dmp

          Filesize

          1.0MB

        • memory/1592-35-0x00000000023A0000-0x00000000023A1000-memory.dmp

          Filesize

          4KB

        • memory/3464-59-0x0000000000600000-0x0000000000601000-memory.dmp

          Filesize

          4KB

        • memory/3464-70-0x0000000000400000-0x0000000000503000-memory.dmp

          Filesize

          1.0MB

        • memory/3464-67-0x0000000000400000-0x0000000000503000-memory.dmp

          Filesize

          1.0MB

        • memory/3908-12-0x00000000006C0000-0x00000000006C1000-memory.dmp

          Filesize

          4KB

        • memory/3908-38-0x00000000006C0000-0x00000000006C1000-memory.dmp

          Filesize

          4KB

        • memory/3908-33-0x0000000000400000-0x0000000000503000-memory.dmp

          Filesize

          1.0MB