Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 07:37

General

  • Target

    940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe

  • Size

    789KB

  • MD5

    940607239cad3ea03adcf806f4657ad4

  • SHA1

    59b5bf627d396dc517eb4cc5d7e681fe13c3d895

  • SHA256

    b7778a4366f42ddbcef07dc270b03c7a0e4132c21156594348233590db2619e3

  • SHA512

    297429abbb3864db2ad1a402d2e5f548a271868a1a8a7b8a5788e943939dd16a92ba47bdb9b5d1dd23029cf6d7eca989cbccb772107e842e82a976f37da69e58

  • SSDEEP

    12288:ntobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu448y:nt8RHjEgYAw1hZlZTWQu7igcyKPEujj

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsiF464.tmp/fallbackfiles/'
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2264.bat" "C:\Users\Admin\AppData\Local\Temp\F3EFAB1027BC491BA8AD8B8E53A4E78D\""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3456
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:4632
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\$I6ZNONN

      Filesize

      98B

      MD5

      8adda707dfabc3ab52751d4c0a1b8d2e

      SHA1

      03e35ed3e0c9a25d5a7a220ef1515b206a97d623

      SHA256

      79acfd43e33c14abcb84a03ac12c8d8fd21c46aee17faeaf65aee91352f22b37

      SHA512

      7aa963b239129e17cd21bba2117f435470b08d425a4adeeedc30abab6cd8e6e2198a49bcf49e4f0f50d02bd72d6cbda65acba33b977d469f4a401953757299a9

    • C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\$IKWDM8P

      Filesize

      98B

      MD5

      5aec2bc2788ac677a31cf1b1af803338

      SHA1

      e97c642038277db59e2a7a68c4e798e1cc3ea88b

      SHA256

      38a95a614507511e3623fbe215f1cfd753f29c668f55e80440f843f2108dd0ce

      SHA512

      d4c627d274d08cbe9365a94b964ac0fd1660f4479fc2ad7f00a6dedbef024cf689366568e73cad3db4b24c1877bbee3bdb7dba2087fb6966b7e7ec263cebe949

    • C:\Users\Admin\AppData\Local\Temp\2264.bat

      Filesize

      212B

      MD5

      668767f1e0c7ff2b3960447e259e9f00

      SHA1

      32d8abf834cce72f5e845175a0af2513b00504d8

      SHA256

      cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

      SHA512

      c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

    • C:\Users\Admin\AppData\Local\Temp\F3EFAB1027BC491BA8AD8B8E53A4E78D\F3EFAB1027BC491BA8AD8B8E53A4E78D_LogFile.txt

      Filesize

      9KB

      MD5

      141cf1a10f210a9ea11616c601b1c854

      SHA1

      1958cde0abb573fd1735032603de0d65ee093ee0

      SHA256

      8a140b3581e096e29527d610e3485937a126adc8ef03876e6798badcd67c4fcc

      SHA512

      1fbd7a69dc2e5396fdc1cb06b515b2e0ae849e92cb3feaca3c1ff6a8f5f1763a84cda76a597b8462fec7fc815869ef496e360fe5717a0dd3e8fc45e068e34b7a

    • C:\Users\Admin\AppData\Local\Temp\F3EFAB1027BC491BA8AD8B8E53A4E78D\F3EFAB~1.TXT

      Filesize

      111KB

      MD5

      4e87bc889f3532be424e78e8dbe1c489

      SHA1

      41fc8359e6824a68ec813ce5e988bd5800171e3e

      SHA256

      b505988ed8ffc3c7381656ab03e8034ad0762066ac7c38dbb593cd1c769426d9

      SHA512

      5cb50e55b8a62ee3c72d080982b03a93d432205bb0940ad422e9992aca5d3d3828dab23234f537692dd032757d49dee10261b2fc2ea86f3616dd9ac124e04f7a

    • C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\StdUtils.dll

      Filesize

      14KB

      MD5

      21010df9bc37daffcc0b5ae190381d85

      SHA1

      a8ba022aafc1233894db29e40e569dfc8b280eb9

      SHA256

      0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

      SHA512

      95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

    • C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe

      Filesize

      1.8MB

      MD5

      9ab5db4bb5971035b4d287d64f9676b5

      SHA1

      33d17f016339572dd05c124d6243fffefd0cd039

      SHA256

      f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

      SHA512

      d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

    • C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118_icon.ico

      Filesize

      17KB

      MD5

      055c2cb77fa2edc2802b7fd397b9c213

      SHA1

      e6bf5af3427539bf609cfb8904b35803a06104d3

      SHA256

      78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

      SHA512

      7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

    • C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118_splash.png

      Filesize

      12KB

      MD5

      fe272d040e82704707b19bfbf29d65ca

      SHA1

      460de628ea63986a7e6390a1623d8ba32dc82aee

      SHA256

      1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

      SHA512

      8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

    • memory/1596-123-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1596-298-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/4384-79-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/4384-215-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB