Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 10:57

General

  • Target

    f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe

  • Size

    20KB

  • MD5

    f7d9fdb5587a91c8ab0ac23209619391

  • SHA1

    6657cacd38d47e8a6945fe7cb4757f4eb5a7c978

  • SHA256

    b89c231f6dcf0b73adf3111ac77a41dd604b4c59fe2fc5ac4eb61f26bc23c443

  • SHA512

    0a7c2687d67255194ffd22c833a86b93d0157b75b3955d3cda9140841ec3a79eba8fd2399dc23a96def8e1b8e9a9393912b9f6569b30bf9b439e1d955a17135d

  • SSDEEP

    384:IKkBB78HJUwxq1y83vFoPJE8osGRi+UqzPNe+VvXJL8Wpa0TTCziUuF5HV4Xf+iD:xvpt01h/FoPJE8osGRi+UqzPNe+VvXJu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 5 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\msisrv.exe
      "C:\msisrv.exe" C:\Users\Admin\AppData\Local\Temp\F7D9FD~1.EXE
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns
        3⤵
        • Gathers network information
        PID:2364
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns
        3⤵
        • Gathers network information
        PID:2504
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns
        3⤵
        • Gathers network information
        PID:3588
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns
        3⤵
        • Gathers network information
        PID:3452
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns
        3⤵
        • Gathers network information
        PID:3012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\msisrv.exe

          Filesize

          20KB

          MD5

          f7d9fdb5587a91c8ab0ac23209619391

          SHA1

          6657cacd38d47e8a6945fe7cb4757f4eb5a7c978

          SHA256

          b89c231f6dcf0b73adf3111ac77a41dd604b4c59fe2fc5ac4eb61f26bc23c443

          SHA512

          0a7c2687d67255194ffd22c833a86b93d0157b75b3955d3cda9140841ec3a79eba8fd2399dc23a96def8e1b8e9a9393912b9f6569b30bf9b439e1d955a17135d