Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 02:31

General

  • Target

    1f24ccad7601b3d8508a005bc73c922d_JaffaCakes118.exe

  • Size

    450KB

  • MD5

    1f24ccad7601b3d8508a005bc73c922d

  • SHA1

    8cc5b39f7b7cca1fcf826165f35ddb5a13f3d2cf

  • SHA256

    206eddfa1ba81f89e15cbfa550597fcb307e62a55890e6879b455e03d4e013aa

  • SHA512

    2b396a497d975a5ae5c00c8d56b7fd254a5a5dd516202521bf8239b7740bd6f7fa1f29c3ef981a196a43a9f8edcbb91b4fa90ee3ef3707c12f59bfb9b06a8147

  • SSDEEP

    6144:EOoM2iSrUT2nTNtY/ccTDtpzQJ953zfjbBagEJdzfIzNJ+xTRUkUkhLY+0:5mnTNtY/zDA53bGJdD6J+xFUtA0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f24ccad7601b3d8508a005bc73c922d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1f24ccad7601b3d8508a005bc73c922d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\Temporary files\installer.exe
      "C:\Users\Admin\AppData\Local\Temp\Temporary files\installer.exe" /path="C:\Users\Admin\AppData\Local\Temp\1f24ccad7601b3d8508a005bc73c922d_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1356
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1388 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3888

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Temporary files\installer.exe

            Filesize

            5KB

            MD5

            da2ec46f16ab47d4e04f73a621a74199

            SHA1

            d10e5a99377db1df9032944660c768c1dfaeb6ac

            SHA256

            6a7efa7373cbb2cdac161902fe1afe016b162799872e2afa9bd8fc11eab3eb5f

            SHA512

            93752089c76f4d7200e7f03e751a46b0ce34bf93a06f4aaed5fa2bd19ffe72a1648bcccde4f138fcd8234fc87355bd8de842cb5c3e481093f03036cf24a692c9

          • C:\Users\Admin\AppData\Local\Temp\Temporary files\parent.txt

            Filesize

            450KB

            MD5

            1f24ccad7601b3d8508a005bc73c922d

            SHA1

            8cc5b39f7b7cca1fcf826165f35ddb5a13f3d2cf

            SHA256

            206eddfa1ba81f89e15cbfa550597fcb307e62a55890e6879b455e03d4e013aa

            SHA512

            2b396a497d975a5ae5c00c8d56b7fd254a5a5dd516202521bf8239b7740bd6f7fa1f29c3ef981a196a43a9f8edcbb91b4fa90ee3ef3707c12f59bfb9b06a8147

          • memory/1356-9-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB

          • memory/1356-10-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB

          • memory/1356-5-0x000000001BC70000-0x000000001BCB2000-memory.dmp

            Filesize

            264KB

          • memory/1356-6-0x000000001C1F0000-0x000000001C6BE000-memory.dmp

            Filesize

            4.8MB

          • memory/1356-7-0x000000001C760000-0x000000001C7FC000-memory.dmp

            Filesize

            624KB

          • memory/1356-8-0x00000000018A0000-0x00000000018A8000-memory.dmp

            Filesize

            32KB

          • memory/1356-3-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB

          • memory/1356-4-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB

          • memory/1356-11-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB

          • memory/1356-2-0x00007FFA36965000-0x00007FFA36966000-memory.dmp

            Filesize

            4KB

          • memory/1356-14-0x000000001FDF0000-0x000000001FE52000-memory.dmp

            Filesize

            392KB

          • memory/1356-15-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB

          • memory/1356-24-0x00000000222B0000-0x0000000022A56000-memory.dmp

            Filesize

            7.6MB

          • memory/1356-25-0x00007FFA36965000-0x00007FFA36966000-memory.dmp

            Filesize

            4KB

          • memory/1356-26-0x00007FFA366B0000-0x00007FFA37051000-memory.dmp

            Filesize

            9.6MB