Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:22

General

  • Target

    694553aaa3a0c96ffa4892293a11a467_JaffaCakes118.exe

  • Size

    671KB

  • MD5

    694553aaa3a0c96ffa4892293a11a467

  • SHA1

    3b41d88189b1c40b3ac786d1747b8715e4530922

  • SHA256

    118a38d94d2b365e5fd01964854c6c1df5ea1a9c1a99c56941da6851428828fd

  • SHA512

    c56c123b71977e89f29dc4fa93747edb90b93542af062b39532b4c9e39308dde74777e3d1fe683bc755247a841bbf8e8f7f40e70122c15c3e04f40e951e1a755

  • SSDEEP

    12288:7d1WzJW0mYgmbxI4B+2pwP0RXvCt3CqXcu0KhTo0W9ChRyii9RqwH6W:B1WzUYgwJM2pwc+CqXcbKhUHCHi/jH6W

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\694553aaa3a0c96ffa4892293a11a467_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\694553aaa3a0c96ffa4892293a11a467_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Users\Admin\AppData\Local\Temp\n2007\s2007.exe
      "C:\Users\Admin\AppData\Local\Temp\n2007\s2007.exe" d2320bdfd2fe2805dd9a9a3bUL40KJSYF9Y6Xp6mC06Y4leQGvvRF6kSxeVZf7RP0+DcLErvuKv+pWE9idtePc4rweA1X9LkVaJ2HUqoli1MmMa1FTPO2AlJ856H+i8s+3z6FNRKoF/YjMui/vGEgchfYeG+QJMNQWYtj6e+PDvXfxv0dcYS0SDRxOTWOqVmgSUtN51Ei1RhyhpHKePsZe/O2tFr920pKfvF5rY= /v "C:\Users\Admin\AppData\Local\Temp\694553aaa3a0c96ffa4892293a11a467_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3216
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3716 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\n2007\s2007.exe

      Filesize

      350KB

      MD5

      4316f8dd279ce879833a07ee5083979e

      SHA1

      4977e56fd1ae2cbec43e715ff29890be8a415ddb

      SHA256

      72adc6a10a81e294ee987eb1dcd9fbe206d77c103ee517dfce00493b38162a63

      SHA512

      dd40d9c2ccc7a4c77617a5e0976a442cb4480ca0898c81463812466785b81ac1ccd918f107278259a4a515cdf881d35a7d5359d1678791343319ae9841349646

    • memory/3216-12-0x00007FFC4ED55000-0x00007FFC4ED56000-memory.dmp

      Filesize

      4KB

    • memory/3216-13-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-27-0x000000001BB00000-0x000000001BB10000-memory.dmp

      Filesize

      64KB

    • memory/3216-30-0x000000001C310000-0x000000001C7DE000-memory.dmp

      Filesize

      4.8MB

    • memory/3216-31-0x000000001C7E0000-0x000000001C87C000-memory.dmp

      Filesize

      624KB

    • memory/3216-32-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-33-0x000000001C990000-0x000000001C9F2000-memory.dmp

      Filesize

      392KB

    • memory/3216-34-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-35-0x00007FFC4ED55000-0x00007FFC4ED56000-memory.dmp

      Filesize

      4KB

    • memory/3216-36-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-37-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-38-0x000000001BB20000-0x000000001BB28000-memory.dmp

      Filesize

      32KB

    • memory/3216-39-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-40-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-41-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-42-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-43-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-44-0x0000000020210000-0x000000002034C000-memory.dmp

      Filesize

      1.2MB

    • memory/3216-45-0x0000000020860000-0x0000000020D6E000-memory.dmp

      Filesize

      5.1MB

    • memory/3216-46-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-47-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-48-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-49-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB

    • memory/3216-51-0x00007FFC4EAA0000-0x00007FFC4F441000-memory.dmp

      Filesize

      9.6MB