Analysis

  • max time kernel
    149s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 16:02

General

  • Target

    0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe

  • Size

    486KB

  • MD5

    0a22016e26a3e9175ae5fb31a50fd993

  • SHA1

    0105e1c499f06cf96e06b445a197b1e0b59b94f3

  • SHA256

    a4fe35c4679468bef0e318c98fe528f008e90829161144926c6bc6af40b357b2

  • SHA512

    205ad4bf44353ef5eaa704b011baa862499ca826933359cc793bf4bdeb4974d1992c9386d83ba879cffdbcb0dfd8eae6320518ef15272dbef6b101a6e8b13aa7

  • SSDEEP

    12288:frF2600C97Ap55ucNdszxTYZRMX00JeUg:fro6s9u5IcNdM5vMB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\468E.tmp
      "C:\Users\Admin\AppData\Local\Temp\468E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe 1C64AB0688D9A70F3A56CD527DA9E1759D1E868563C22278EF81C1F4B02D23B6BD5EE1052DC86028D3536B2966D48BECA94C36A6B2090ACB985903FCFAFCCC66
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.docx

    Filesize

    140KB

    MD5

    e90e498009a13ae957dcde4e01065e7d

    SHA1

    dcb4cc9b7d1ed3becc625597422d60aaf068a759

    SHA256

    ca91bbd477e2a516997c48dde3da1a5eae4cad86ca664fea54f0103739073c94

    SHA512

    4d0868f653e6c57d4011430ab81688f4f039550a9a0b5b1ce5ab1a695cb1dca7d7cdfb1d7c3920c35bbd3a8b441c820f00ae4e71f749650545ddd6894d597766

  • C:\Users\Admin\AppData\Local\Temp\468E.tmp

    Filesize

    486KB

    MD5

    cc8add451ba8349ca48aec979b3ab922

    SHA1

    6d1bc02cef832283ceb6598badff6d7eddc1243d

    SHA256

    7cd6e11e64d17502d6af75852e4e81bb1f758d0b13566a6e56cd95b3740d10d2

    SHA512

    b29e42608289e711b06d3b0e801ad62a379e0016ec38335ba2865dd46f7cd830729a4b9d079313c991d21c3e88366703fe8c25a7b84893dc199bd72f8960f7a3

  • memory/3776-13-0x00007FF8DD7D0000-0x00007FF8DD7E0000-memory.dmp

    Filesize

    64KB

  • memory/3776-10-0x00007FF8DD7D0000-0x00007FF8DD7E0000-memory.dmp

    Filesize

    64KB

  • memory/3776-11-0x00007FF8DD7D0000-0x00007FF8DD7E0000-memory.dmp

    Filesize

    64KB

  • memory/3776-12-0x00007FF91D750000-0x00007FF91D945000-memory.dmp

    Filesize

    2.0MB

  • memory/3776-9-0x00007FF8DD7D0000-0x00007FF8DD7E0000-memory.dmp

    Filesize

    64KB

  • memory/3776-16-0x00007FF91D750000-0x00007FF91D945000-memory.dmp

    Filesize

    2.0MB

  • memory/3776-15-0x00007FF8DD7D0000-0x00007FF8DD7E0000-memory.dmp

    Filesize

    64KB

  • memory/3776-14-0x00007FF91D750000-0x00007FF91D945000-memory.dmp

    Filesize

    2.0MB

  • memory/3776-17-0x00007FF91D750000-0x00007FF91D945000-memory.dmp

    Filesize

    2.0MB

  • memory/3776-18-0x00007FF8DB270000-0x00007FF8DB280000-memory.dmp

    Filesize

    64KB

  • memory/3776-19-0x00007FF8DB270000-0x00007FF8DB280000-memory.dmp

    Filesize

    64KB

  • memory/3776-31-0x00007FF91D750000-0x00007FF91D945000-memory.dmp

    Filesize

    2.0MB