Analysis

  • max time kernel
    91s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 12:36

General

  • Target

    792de0caf5fbaabbb2536fb106f8a982_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    792de0caf5fbaabbb2536fb106f8a982

  • SHA1

    6c664334d1e0fee3865ea0edb9331d38160a5926

  • SHA256

    adacb82b03f8cb261e555f33e6eb8847e317d21448542fdec54063ca304ddd4e

  • SHA512

    ce944b5d870dc090dbb9f20c075923ca6583aab285ccad960b5359c2d086d3e5fd3ba04d4d6da24383dfb1a6be56a4a59df97e0b4f485c851304aef7733271a6

  • SSDEEP

    768:pfG7lkdc317ukHjgfkyPZ8Idl4UXrTROOgvuAHwuPG1cwJPDoJU05icZ+3p6rWpR:aR16kDT+ZxlZGHwue7PDoeQ8U+3TF

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\792de0caf5fbaabbb2536fb106f8a982_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\792de0caf5fbaabbb2536fb106f8a982_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat3328.tmp.bat" "
      2⤵
        PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bat3328.tmp.bat

      Filesize

      192B

      MD5

      f60dcd35d0be278fb7e03e97f3cc0200

      SHA1

      6010b5114e9c44889d524d91c39edaa3acd03289

      SHA256

      36a408c1f665c8326d56eb95249369949ee8cc252e6145c3fb916774de099012

      SHA512

      9213313b77936d589b44e0a3216754f005f03af27279aff8bc259432572408907ebc94975dfef532443c3c532ae8514a3811480c6c8431fa2a54ad4119574259