Analysis

  • max time kernel
    135s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 06:40

General

  • Target

    f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe

  • Size

    213KB

  • MD5

    f2e9b3569c6805694787578f51c6f928

  • SHA1

    0102d27426413619ff42dc5b3dfc3769c3c27be7

  • SHA256

    9e6e06a9ccda1c82b355ab3e163897a9187159781e902beb76276862d7ade6c3

  • SHA512

    1eb326949fa9ee2787bee8961c40ba971b5622f3fa2471ea25a172f3601531a95147ecdc6587d92e4693b9af6cd4c8d52f665d5ee39c6a19ce078f6b31932853

  • SSDEEP

    3072:AfP+miCL5fWqeKuIwxLBqbWeUJIj4tWVAHZux6fKQJ:8PECL5+/KunEqeSxtuwnfX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jbp..bat" > nul 2> nul
      2⤵
        PID:4764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Jbp..bat

      Filesize

      238B

      MD5

      d201422e156dd402cc25416980d18c7a

      SHA1

      fd17389aafa9e6f12e9c32adb039a15768fd70bd

      SHA256

      b176679c8ae6e1fc9d841b3824e8da5c81a19cb2365c1c6fda64f70323b9b810

      SHA512

      038a09a76967b213e313b28b12c48433e5e9836679ce1e627d7d88b1270369228332fee842841e92b01ce88f4847475cddf0efd83d565e071fe743bafb82512c

    • memory/3068-0-0x0000000002040000-0x000000000204D000-memory.dmp

      Filesize

      52KB

    • memory/3068-1-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/3068-2-0x0000000002080000-0x0000000002081000-memory.dmp

      Filesize

      4KB

    • memory/3068-3-0x0000000002080000-0x0000000002081000-memory.dmp

      Filesize

      4KB

    • memory/3068-5-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB