Analysis

  • max time kernel
    66s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 07:05

General

  • Target

    04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    04a2e6117dcfda604934b6d32df2e2dc

  • SHA1

    ad3020a0c1b2fcb32d1bc77a9108e078fc02039a

  • SHA256

    166c4c03bc5177904bd0739d07b1c71163f235d7bbb444da8a0fb136d1744eb0

  • SHA512

    a2d633e5c5aa247387db295777497e5ed9cee5ae824ec6b9ed82251ad4daaf77d1694964eb80f7ca3601d45c914a7f9ef45410f0c9c1bbf8f2a75183a94479d0

  • SSDEEP

    3072:w6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraSo:w6p2sSxTrGvsFUejWyZr3hPswaH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\qgp1872.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"
        3⤵
        • Views/modifies file attributes
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\qgp1872.tmp.bat

    Filesize

    53B

    MD5

    b22504105ff880374970028b48515698

    SHA1

    17d99b9e2ceb9f5cb2aaf2ed8daa362b236fca4b

    SHA256

    3ffcac5cddf43259f358e44e719f29646b02982a4fb0adb618a553c53a95597d

    SHA512

    941ba313ae29d50d0b453e8b72caf9eb523c7e31b610b3d099a33cbd78e2a4641005c0397d3a7fed24071df7bfa939963ef71c275885c8856990eb8d9c274ec3

  • memory/1984-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1984-5-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB