Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 09:04

General

  • Target

    2422da304767ee6d616f445e515e874a_JaffaCakes118.exe

  • Size

    683KB

  • MD5

    2422da304767ee6d616f445e515e874a

  • SHA1

    4b055c51f860676488ca54ac651dc9364f72811b

  • SHA256

    1141bf74af745afdd084f3e342c895cfea6aac4a374ab62cad63c73f2f004e27

  • SHA512

    fbd0917fa6cdf68e82fe641606742f1c3efd48c2cad375a5ee57dc95b3f86f7f3c12d4d8ffc8b8547ffb6fb829a9d428ba1f0681efa79c1f36e3afe142770332

  • SSDEEP

    12288:apI1ozCEXgFQZ5O4GsLUfia4eiTxMovq6WuPCOlf5+V6b:yI1oz7gFGL/Uqbe6x5Ku6Op5+V6b

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2422da304767ee6d616f445e515e874a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2422da304767ee6d616f445e515e874a_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\n9247\s9247.exe
      "C:\Users\Admin\AppData\Local\Temp\n9247\s9247.exe" 4f8338a6ac01720606dabea6kFvv/2ejb2bQMVYQTl/+Lm5XAxpq8KjIXx7OZ4MyL+EhhD/l7bQYbEYhNnoAlecfICRpOE7uCqmdw31XlqqeQGhUdSydsCuKzJRDDnZFeBaS8NJAZCCH+hj0R8bZuOGMOJ5hYdJiygqozLpXsvtmGfDn54u3pjugL2cl/ZYr /v "C:\Users\Admin\AppData\Local\Temp\2422da304767ee6d616f445e515e874a_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:628
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2696

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\n9247\s9247.exe

            Filesize

            350KB

            MD5

            d438749bcfe5bcdf1d59cbbb82341315

            SHA1

            2f4176c631e0190f35eb2963a4f8ad692fdcd6b7

            SHA256

            0aa566ada2feeb1714acd636da309edc6c3a9b0b8873d97942b55e053e55dd42

            SHA512

            f6ea2cf132c6564d685a6386705f2ff9b3912697f70d3e97e1754084c6c589141f3f72d6d82eeb6cc677a331325ab486389b1e3a202b7b21149499e8c020c67e

          • memory/628-12-0x00007FFAE3A55000-0x00007FFAE3A56000-memory.dmp

            Filesize

            4KB

          • memory/628-13-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-14-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-28-0x000000001B860000-0x000000001B870000-memory.dmp

            Filesize

            64KB

          • memory/628-31-0x000000001C7D0000-0x000000001CC9E000-memory.dmp

            Filesize

            4.8MB

          • memory/628-32-0x000000001C1A0000-0x000000001C23C000-memory.dmp

            Filesize

            624KB

          • memory/628-33-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-34-0x000000001CD10000-0x000000001CD72000-memory.dmp

            Filesize

            392KB

          • memory/628-35-0x00007FFAE3A55000-0x00007FFAE3A56000-memory.dmp

            Filesize

            4KB

          • memory/628-36-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-37-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-38-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-39-0x0000000001270000-0x0000000001278000-memory.dmp

            Filesize

            32KB

          • memory/628-40-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-41-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-42-0x000000001D6A0000-0x000000001DDF7000-memory.dmp

            Filesize

            7.3MB

          • memory/628-43-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-44-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-46-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-47-0x0000000020BE0000-0x0000000020D1C000-memory.dmp

            Filesize

            1.2MB

          • memory/628-48-0x0000000021230000-0x000000002173E000-memory.dmp

            Filesize

            5.1MB

          • memory/628-49-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-50-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-51-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-52-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-54-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-55-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB

          • memory/628-57-0x000000001D6A0000-0x000000001DDF7000-memory.dmp

            Filesize

            7.3MB

          • memory/628-58-0x00007FFAE37A0000-0x00007FFAE4141000-memory.dmp

            Filesize

            9.6MB