Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
7cd7e1be96600eda549254f46037596f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7cd7e1be96600eda549254f46037596f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
$_3_.exe
-
Size
1.8MB
-
MD5
77bfacca17ee1d89833b57f3a746d9a0
-
SHA1
aa9490c913489c5eafd02f67f875efcb56d23036
-
SHA256
38571b0965110d07c6fbf4813ab628d4017cf52c681c457fb3f184b644fb0b52
-
SHA512
21ecc2fce94a58cd39127964730b01722b9dafa20d3af65b023fe83188c08211ba1324849513ffc10b6a359737f98c4d06770dc1954f8880daff938a06581e6f
-
SSDEEP
49152:/SNY8H0ZGF5j51XdQTPRPgojx1NslvUOl/WkMWAH:oY00Z8F1XdUL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation $_3_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4724 $_3_.exe 4724 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4724 $_3_.exe 4724 $_3_.exe 4724 $_3_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4724 wrote to memory of 4764 4724 $_3_.exe 96 PID 4724 wrote to memory of 4764 4724 $_3_.exe 96 PID 4724 wrote to memory of 4764 4724 $_3_.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\21434.bat" "C:\Users\Admin\AppData\Local\Temp\9BA310DFEECA44C18035F9E12FD43D89\""2⤵PID:4764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5739fcc7ba42b209fe44bea47e7a8c48f
SHA1bc7a448a7c018133edcf012bc94301623eb42c5b
SHA25669017cdbbe68396f45e41d211b22d800cc1afc0eadbd3440873038585020315c
SHA5122b2b130798b0f4e534626b9fb5deaa10bb1930e6700ac0ba7cf151c1bf3239039a7032ea67ceed86a4a4dbe981064c42a8e0f88fe8361e27002dd8ceb0ea767a
-
C:\Users\Admin\AppData\Local\Temp\9BA310DFEECA44C18035F9E12FD43D89\9BA310DFEECA44C18035F9E12FD43D89_LogFile.txt
Filesize9KB
MD5782d46413c111abd618901ec66b182fa
SHA11121c876916dde0bb0677c843503e95ca768b61d
SHA25615f46b9b4e56bff8c17766502ec9de761969bdfe055748f5452219f5cfb9a118
SHA512f31ef8a52cc617bc325c34a14e78e115f985bddc3125cf81bb9a722e31f0cf9c3bd6a1c4e48c8d2cd7e0ab1f78f130c1bca66b2aa3861665e6fd20034db58c90
-
Filesize
107KB
MD57f9b80b0d57a1eca7611bfc5aa7d4a31
SHA156278a546f068c03c40b440766762dd0360c3ad8
SHA256b22d356f3b82258495fa2cd999a4e47d9d35fe478028965a52415eeca29be019
SHA51244e3f7e1786aded0f43b4a3948343e0fb21dfde64f5e3936b13268ceb7555a1b2ed64c2ad6ca2396e6a6aa4055d2f9d062f9ada56608a2ae4b9f3a7fb195b710