Analysis

  • max time kernel
    98s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 08:49

General

  • Target

    a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe

  • Size

    370KB

  • MD5

    a4b46a2d2668ca96d4bd05d3f6caa702

  • SHA1

    55823d20faa81c636e94c31bb4b2cbacac1b87f5

  • SHA256

    184866a48db2531dfcce10c98fad84235e1364601edc50f20c64a1163cc5fd1e

  • SHA512

    02c06d2353f660b4ca2c12bccc16d2a0ce0639cb92638b09dc0b0dcd9ab098a87959054fad0652d232ff197292f331943cb514f92c095ab5770db3e7b3000713

  • SSDEEP

    6144:40mlfM4a0g33ofNpLt23hUsHBYEnjBU9VaoeYQrz3462TAmd9exwxLQrrX7UZgKx:6Cd0g3YvE3vGEijQvojd97LuX7UZgK1v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\upx.exe
      "C:\Users\Admin\AppData\Local\Temp\upx.exe"
      2⤵
      • Executes dropped EXE
      PID:2328

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\shirt-1455918314-3e2ee56390bcb910c53bc875685f8b41.png

          Filesize

          154KB

          MD5

          b96c7f33413cb6b2959fea36ce570709

          SHA1

          950ffdfc78f8cad72e7e808dd2cb383a0e2b69d6

          SHA256

          f38f14f5c443a044d1d83703347ba473560aa70f74ac82ba6331769b57b4103a

          SHA512

          cb474f3cd261fc9bc181eedcaf7469fd45065ff92a2b7611dd1c006b8e8dd4d5b4548250b84936ff41a728ae505ea5b2e84c160385d7ab3a8de782b6531cd4ae

        • C:\Users\Admin\AppData\Local\Temp\upx.exe

          Filesize

          187KB

          MD5

          612df6b774ec53d6db34e4edbc1bc16f

          SHA1

          8d153f2041e4ef4c6ee02534f6f673ca9583ee95

          SHA256

          5148fc6bcef562729e57195fae858e73e2203c4b8f797005c2174662f5908946

          SHA512

          f3f98c82324271dac371ceb5aaed8e089f78bef505af404378c5922897d5b1e717a7751e405c71e5bdb345d7b19646475b33350fd8ad7f8da8cb777cb95512fd