Analysis

  • max time kernel
    138s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:58

General

  • Target

    659c38ad408f00aa8875249d2f54f0ea_JaffaCakes118.exe

  • Size

    12.0MB

  • MD5

    659c38ad408f00aa8875249d2f54f0ea

  • SHA1

    f82d0e518e1694e59cc2fd6e182beb418fa4700a

  • SHA256

    69fb2a822a9232b9b4269df44243660441d4e1f42b17a0c19fc707993fa81f8a

  • SHA512

    4042948e587aeb8a7fa42e95201c778cbffb1265d47392b9ec6126b6ff6411faf4a9783695362b6d299e7e060c61122acc50fd0cb8a6386b373867d2ac7fe515

  • SSDEEP

    393216:APcyXRDEpn/DG2V29RP0x0ATlI9/7tC0f06:AHXRDEpKK2ryWhtC086

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\659c38ad408f00aa8875249d2f54f0ea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\659c38ad408f00aa8875249d2f54f0ea_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Users\Admin\AppData\Local\Temp\PatchSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\PatchSetup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4748
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PatchSetup.exe

      Filesize

      31KB

      MD5

      5f245c2d93d4a26a02fe9a37762def4f

      SHA1

      0fc68a024f02f0898e86872c7d7a4fa6f669757f

      SHA256

      8ed0f9e7e670f02894cf1f48abeb8301d1e8ffaf27b39632d90163c2c587a7ba

      SHA512

      bdde5081452981aec16ebb69dea289edcb6c4aecd40ca2b103055ac4683432b2aff904a03896e84a062c3a24c89b0b14faa51d2b3d2986b1111909213299f46c

    • memory/3800-0-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/3800-1-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/3800-282-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/3800-417-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB