Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 23:14

General

  • Target

    fb62324191792a4298377deab42ea4cf_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    fb62324191792a4298377deab42ea4cf

  • SHA1

    2a9c003312f5577717df3982ed42badef54ac4a5

  • SHA256

    dd3492b140004d0b8746e026648a1a2c3628e8c27bf73bed7bb8138ac7ef9ffb

  • SHA512

    56e0c315479c8a1537f158b48e7aaa159ff2f5b87d329c7c1feb2a3236a38d324bef26781c558e2d43f13d39655c50cae1ebfcfbc30924c5630d1b409ea31866

  • SSDEEP

    768:tJKVTZv/eUkH21SuluU9IO/jzm+xdHW2+FRth8:tEVTZv/fkHePf/HTdHo8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb62324191792a4298377deab42ea4cf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb62324191792a4298377deab42ea4cf_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "
      2⤵
        PID:2508

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\delself.bat

            Filesize

            230B

            MD5

            82fb7db8d7664342964fc4494d8d2009

            SHA1

            964e2caf2c7fbffa8c0300042465934c1e0aac5b

            SHA256

            4d7a6a4ab491b8d6605da9236f906d3de739e6186d8ed3ef552af21f174960f4

            SHA512

            0b92d47453cb98f8bf76cb963467af0ed3fbaa33a9cd19c29ac9867a27c34736663a7dcc61b101685cbed27da770746622af3eebf7756581f769e534686c6c84

          • memory/2144-0-0x00000000001D0000-0x00000000001D8000-memory.dmp

            Filesize

            32KB

          • memory/2144-6-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB