Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 15:01

General

  • Target

    ff8c4a8324fda9c92947c840b00fc3e8_JaffaCakes118.exe

  • Size

    476KB

  • MD5

    ff8c4a8324fda9c92947c840b00fc3e8

  • SHA1

    0d84c8bcb060d6e3f206c4165e31895bf7842d81

  • SHA256

    89bfd55681bc42ad2c2645dd5583663128942ad3284060bed30c03e3cc30ff2c

  • SHA512

    d0851c615736fbd0b6a2eac8fdde0f93ea6d7494815a5d465ecb83d7b5bcd359cfcea6c57a403153fd869ecebb876e5fd6898e492511b48c38b1449f23b2efd6

  • SSDEEP

    12288:TNodBiTI+TpJA6EZO7KUQRZ66z24VZbdrpgrXN2LWzmidN:ZoPD+TpJ3vKU6Z66z24VZbFpgJ2LWzm+

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff8c4a8324fda9c92947c840b00fc3e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff8c4a8324fda9c92947c840b00fc3e8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    90B

    MD5

    8e5fda014df3d24c51509a4c7cef7222

    SHA1

    ec049d2b450867caf7f605ad10e6e30a3870af27

    SHA256

    321915e120614b713ea66568ac4cda4b73be206b0a76445ba1c82f7a675cf24f

    SHA512

    a8877b602ee7ed056764bd760ad9d0123a000edd6103db32e2a703f63726a124a80c667aa0565a841a714fd3fe2d5074c3443a0af508db539c2044f5ee65c091

  • memory/976-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB