Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2024 14:54

General

  • Target

    13375733eeeb154716c6ec58544e6701_JaffaCakes118.exe

  • Size

    518KB

  • MD5

    13375733eeeb154716c6ec58544e6701

  • SHA1

    a158db51d6558b358b523e03eb85d322614f35a6

  • SHA256

    18a572ea60fa983dad6c73d4ddceb916348c6d960ff83acbc171e8bac25d7f25

  • SHA512

    5517211da43dd86e823d5b1714168b2dc6286dec61aa05ec77c18f15952404bd34c8900228892601ea4d2598caf5edfdbf675ef9af367833cc550e6ffe773aee

  • SSDEEP

    12288:dYvksw0qRRIKmn4YCs7LvMXtto1fJda+9EiBZSZ:dYvksmRQt7UtuJLH9EiBZSZ

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13375733eeeb154716c6ec58544e6701_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\13375733eeeb154716c6ec58544e6701_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\n7825\s7825.exe
      "C:\Users\Admin\AppData\Local\Temp\n7825\s7825.exe" 424389d970c43576c7d10881LLT2rOT8rHGohrUoxkWNvLNNn6zsPFZBjWu5Yvvgf7H2MM977/9OH3oQHhaEkdRcIq1InLQ+50ki5CR3vokObIELCNaSRHKvvuwzrsekgTFZVJ5/D7RaDEYcpwdXJEvaotaS66DCCQ38QKyq204WVGDq /v "C:\Users\Admin\AppData\Local\Temp\13375733eeeb154716c6ec58544e6701_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n7825\s7825.exe

    Filesize

    230KB

    MD5

    f6bf052647bbf9a0fc34da26907be904

    SHA1

    007955815a3f142fa279a04fdc360e7fb9b5a324

    SHA256

    bac01719e43d9019ec34d749dd76274c0e49843bd0c8789ac1df0a5850e4919d

    SHA512

    88b0d37f4615dbe6e277d3d32b9a82e76f8c7982367057d4c0697f73736b91fe2668adf13ce14867e256eb84a03846ed1566dd4ddf2745754b5ebcad2de24f9e

  • memory/4588-12-0x00007FFAE9D95000-0x00007FFAE9D96000-memory.dmp

    Filesize

    4KB

  • memory/4588-13-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB

  • memory/4588-22-0x00000000011F0000-0x0000000001202000-memory.dmp

    Filesize

    72KB

  • memory/4588-25-0x000000001C610000-0x000000001CADE000-memory.dmp

    Filesize

    4.8MB

  • memory/4588-26-0x000000001CB80000-0x000000001CC1C000-memory.dmp

    Filesize

    624KB

  • memory/4588-27-0x000000001CCA0000-0x000000001CD02000-memory.dmp

    Filesize

    392KB

  • memory/4588-28-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB

  • memory/4588-29-0x0000000001400000-0x0000000001408000-memory.dmp

    Filesize

    32KB

  • memory/4588-30-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB

  • memory/4588-31-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB

  • memory/4588-32-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB

  • memory/4588-33-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB

  • memory/4588-34-0x0000000020810000-0x0000000020D1E000-memory.dmp

    Filesize

    5.1MB

  • memory/4588-35-0x0000000020D20000-0x0000000020E5C000-memory.dmp

    Filesize

    1.2MB

  • memory/4588-37-0x00007FFAE9AE0000-0x00007FFAEA481000-memory.dmp

    Filesize

    9.6MB