Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 21:23

General

  • Target

    fdade656dbe21b750af957159863c56d_JaffaCakes118.exe

  • Size

    630KB

  • MD5

    fdade656dbe21b750af957159863c56d

  • SHA1

    17f5402ef3fa0ffa858aed51f899a1e4a132bb52

  • SHA256

    2278173e5e1a188648cfbdc28969d3498f07b02faeee9d5c9d238cfec1c9a7f4

  • SHA512

    f9b6cd8641d79360831087e47f926682acdc495123ba6abd852e9dfa30a3195562bd238c8a73713a742cd4752f410a86942aa251a653f3fc23d14d6a49cab3df

  • SSDEEP

    12288:nuWI+N5yeDd+YyZICo61m6ZT6H+rru8DlViOHdjzSIlj839:uWI+NtdQ9m6ScueYIlj839

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdade656dbe21b750af957159863c56d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdade656dbe21b750af957159863c56d_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\AppData\Local\Temp\n584\s584.exe
      "C:\Users\Admin\AppData\Local\Temp\n584\s584.exe" 631a9454357e7bb4b9a77595xbyDmQYLpcALvBIqN9SEVAfK5EYa/6o4OV/kQtXP3nbEbwbbTZBSGpW7mJgYr8+Eg7Nx97wLCllTtLEe6AQUZtiwVgod4Khid8nGH0IQSKPKHvm9zCQGMBJomf3W/hznoqgSWUBfDHCJl60jHliOIF5FAtT6NLqkQpJGmZs= /v "C:\Users\Admin\AppData\Local\Temp\fdade656dbe21b750af957159863c56d_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 1956
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n584\s584.exe

    Filesize

    373KB

    MD5

    06a18cd5024a98cd2cdeefc515cef70d

    SHA1

    c4e6db69ee1dae061ac197a8dd4432b6fe68b787

    SHA256

    9387ab6c4fc5227ce06f355a1906ded58419760aefdf28bbe2075c2f0a565492

    SHA512

    31d4e643a797e2790eed5814654e35a92f1bede041f6fbf8086b536268a3a0990fc996dce08bab08936f5522fe0ff4c22a173a2bb3d27d73c104e1b5691b8b65

  • memory/3560-12-0x00007FF9B2B50000-0x00007FF9B34F1000-memory.dmp

    Filesize

    9.6MB

  • memory/3560-13-0x00000000012B0000-0x00000000012C0000-memory.dmp

    Filesize

    64KB

  • memory/3560-29-0x000000001BBD0000-0x000000001BBE0000-memory.dmp

    Filesize

    64KB

  • memory/3560-32-0x000000001C750000-0x000000001CC1E000-memory.dmp

    Filesize

    4.8MB

  • memory/3560-33-0x000000001CCC0000-0x000000001CD5C000-memory.dmp

    Filesize

    624KB

  • memory/3560-34-0x00000000012B0000-0x00000000012C0000-memory.dmp

    Filesize

    64KB

  • memory/3560-41-0x00007FF9B2B50000-0x00007FF9B34F1000-memory.dmp

    Filesize

    9.6MB