Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 12:06

General

  • Target

    348012a78b3b886c5704752c78d25878_JaffaCakes118.exe

  • Size

    678KB

  • MD5

    348012a78b3b886c5704752c78d25878

  • SHA1

    852c800f2f5dafa964075b2fd1266dd5215c05b0

  • SHA256

    24e5a2fa07ca3fbe7310466578e2b833274f894483ea3faeb489a4b3805c229b

  • SHA512

    8caf93117c991177903b527cf262ee083574efefe85e5e93e8012aacfd106cbb9fedadc3c65b0ecca705d4f4f1470757c3a54a2826ef2eefe553a46aaccb1790

  • SSDEEP

    12288:ZyE2QYrOLw9saOiCXcU/OQOCeDHg23sMhEJZT1aRYNg+61:cE2QYrr6iwcWOQOfLg6sMCDT1a2a+61

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\348012a78b3b886c5704752c78d25878_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\348012a78b3b886c5704752c78d25878_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\n6472\s6472.exe
      "C:\Users\Admin\AppData\Local\Temp\n6472\s6472.exe" 421b5be21bea572ae6236d79II+0SKeJDh2WlFMISaFue19v6yUsvDJ2jKST2NnyRd+DAEeWCqt32LpYwEcZn17lxEqZII6/rvmEPVpGG+auWtIJPmPaC/loVfm3ur2C+Ohr2s8q5SeZQHc+z/0wal9KrLVZ2tNpgctKsls9nL+jSfFufztHibX4nLat4IFeVw== /v "C:\Users\Admin\AppData\Local\Temp\348012a78b3b886c5704752c78d25878_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\n6472\s6472.exe

          Filesize

          350KB

          MD5

          da834fff62c4d3e86baa52714cf2d635

          SHA1

          4b35992bbd61e75791ec55bf3b47921be26b3031

          SHA256

          6079e9ad58853c80733363903df046a8008bc8b972b1c52c7eff99b5ed6ad681

          SHA512

          1227d5300237915a4382576fb19bc9ceb304a7ab8455d850154e6b7b8a92356a107a39180f866ad617da9a90745224ae6a8d1f602992c59353d2ad2c267c6526

        • memory/2244-12-0x00007FFC405A5000-0x00007FFC405A6000-memory.dmp

          Filesize

          4KB

        • memory/2244-13-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-22-0x000000001BBB0000-0x000000001BBC0000-memory.dmp

          Filesize

          64KB

        • memory/2244-25-0x000000001C740000-0x000000001CC0E000-memory.dmp

          Filesize

          4.8MB

        • memory/2244-26-0x000000001CCB0000-0x000000001CD4C000-memory.dmp

          Filesize

          624KB

        • memory/2244-27-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-28-0x000000001D0A0000-0x000000001D102000-memory.dmp

          Filesize

          392KB

        • memory/2244-29-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-30-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-31-0x000000001BFC0000-0x000000001BFC8000-memory.dmp

          Filesize

          32KB

        • memory/2244-32-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-33-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-34-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-35-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-36-0x00000000207D0000-0x000000002090C000-memory.dmp

          Filesize

          1.2MB

        • memory/2244-37-0x0000000020E20000-0x000000002132E000-memory.dmp

          Filesize

          5.1MB

        • memory/2244-38-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-39-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-40-0x00007FFC405A5000-0x00007FFC405A6000-memory.dmp

          Filesize

          4KB

        • memory/2244-41-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-42-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB

        • memory/2244-44-0x00007FFC402F0000-0x00007FFC40C91000-memory.dmp

          Filesize

          9.6MB