Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 02:05

General

  • Target

    f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe

  • Size

    304KB

  • MD5

    f270db5f7baedc42d14ef24269002e3f

  • SHA1

    6bda8899da0244b5e6af1457d4d0b6870bc33e6f

  • SHA256

    f059929a572ea4779efe325bdcf649f0f535721a101e3faa6c7cfcd904ee3eab

  • SHA512

    043a5e28005422b7e840b062f08882de6394470ada1bfb94502e9125142afdb14b6a5a45340f0673c067878aaacf53301beb954d464f9fb295af5c16f72bd97a

  • SSDEEP

    6144:hD1PqteLZrtcpjjwGJVtPhXaMccErnEfPG3DYJ35KfRHPXNT06g:hxUcrwjwGJj1lHCEfmmURPX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\googleupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\googleupdate.exe" C:\Users\Admin\AppData\Local\Temp\A48D.tmp
      2⤵
      • Executes dropped EXE
      PID:1412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 500
        3⤵
        • Program crash
        PID:3448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1412 -ip 1412
    1⤵
      PID:3024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\googleupdate.exe

      Filesize

      304KB

      MD5

      f270db5f7baedc42d14ef24269002e3f

      SHA1

      6bda8899da0244b5e6af1457d4d0b6870bc33e6f

      SHA256

      f059929a572ea4779efe325bdcf649f0f535721a101e3faa6c7cfcd904ee3eab

      SHA512

      043a5e28005422b7e840b062f08882de6394470ada1bfb94502e9125142afdb14b6a5a45340f0673c067878aaacf53301beb954d464f9fb295af5c16f72bd97a

    • memory/836-0-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/836-1-0x00000000021F0000-0x0000000002236000-memory.dmp

      Filesize

      280KB

    • memory/836-2-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/836-3-0x00000000022C0000-0x00000000022C1000-memory.dmp

      Filesize

      4KB

    • memory/836-4-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/836-20-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/836-21-0x00000000021F0000-0x0000000002236000-memory.dmp

      Filesize

      280KB

    • memory/1412-16-0x00000000005D0000-0x0000000000616000-memory.dmp

      Filesize

      280KB

    • memory/1412-18-0x00000000007D0000-0x00000000007D1000-memory.dmp

      Filesize

      4KB

    • memory/1412-19-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/1412-23-0x00000000005D0000-0x0000000000616000-memory.dmp

      Filesize

      280KB