Analysis

  • max time kernel
    112s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 17:08

General

  • Target

    0a2bdefc5e758803968fe543b66c12c3_JaffaCakes118.exe

  • Size

    627KB

  • MD5

    0a2bdefc5e758803968fe543b66c12c3

  • SHA1

    ac63b96c08d9224698df365f0580e8d970cda805

  • SHA256

    166860ed67354af80eca165729fc5259d90e9bb0277feffb71f97316327c2596

  • SHA512

    79669fe645f90e5e7e6ad1f920a87919e54cc689508cfc53b6aa7048382ecc12d168e90df1565c02c86a7a00873b587818e7fb8fd8e1ddbb1a0aa2d74d6e0c51

  • SSDEEP

    12288:vIfDX4Qe9z6sdTCXzRQSmPIDBrSfDriAra8xm6E:gfDX4osspmwDFgD3xm6E

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a2bdefc5e758803968fe543b66c12c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a2bdefc5e758803968fe543b66c12c3_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\n9442\s9442.exe
      "C:\Users\Admin\AppData\Local\Temp\n9442\s9442.exe" 2d736ff2036ae6a34d918792zCxuzQ43mBr1jHAxoz31o4JNtANA3SSG/R7m1QpimpQ54MjboBilTJZaCvdv5yr+UkxQylX8sgoIB8rmTkuYb2CUBh5XLT1i+VjDyIaKq0OS0tHjZI7oaLJgHeOGhvkLJVDH0Jx4I1EHvnsi1dzary0jVeQGT4S0q7zByxLy /v "C:\Users\Admin\AppData\Local\Temp\0a2bdefc5e758803968fe543b66c12c3_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n9442\s9442.exe

    Filesize

    350KB

    MD5

    39b961520af5ab4b1420140e76e0fd2f

    SHA1

    96c6c87fd9b46625e1f364d833a8231d463f0fd5

    SHA256

    0533cd8f934b9763d09a1e164ac02b67d6df34eb7584f783adaf7a777ce48cea

    SHA512

    69d86ce653e8f5ab7c9c45e9e05dd5a12b31d739fef0881e63c917fe0ccbe9177b59e92b33dd3774d53bdd1837abb571bea43fd1297ecf4359b607716454668a

  • memory/4628-12-0x00007FFAF8B60000-0x00007FFAF9501000-memory.dmp

    Filesize

    9.6MB

  • memory/4628-13-0x0000000000940000-0x0000000000950000-memory.dmp

    Filesize

    64KB

  • memory/4628-14-0x0000000000940000-0x0000000000950000-memory.dmp

    Filesize

    64KB

  • memory/4628-15-0x000000001B260000-0x000000001B270000-memory.dmp

    Filesize

    64KB

  • memory/4628-18-0x000000001C250000-0x000000001C71E000-memory.dmp

    Filesize

    4.8MB

  • memory/4628-19-0x000000001C720000-0x000000001C7BC000-memory.dmp

    Filesize

    624KB

  • memory/4628-20-0x0000000000940000-0x0000000000950000-memory.dmp

    Filesize

    64KB

  • memory/4628-21-0x000000001C8F0000-0x000000001C952000-memory.dmp

    Filesize

    392KB

  • memory/4628-22-0x0000000000940000-0x0000000000950000-memory.dmp

    Filesize

    64KB

  • memory/4628-23-0x00000000204F0000-0x00000000209FE000-memory.dmp

    Filesize

    5.1MB

  • memory/4628-25-0x00007FFAF8B60000-0x00007FFAF9501000-memory.dmp

    Filesize

    9.6MB