Analysis
-
max time kernel
80s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
b7dc69e343603e99dee4ed51ce39fce7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b7dc69e343603e99dee4ed51ce39fce7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
$_3_.exe
-
Size
1.7MB
-
MD5
c4ca24ec91ced69fc98fac6fba21dc88
-
SHA1
b84f3a1ceef89673e31e0be210eb33d865d60659
-
SHA256
c690bea2115b2a16e23c845785772d14fdb978d32cb22bbbce83f53673eda821
-
SHA512
5783d1b8599d472039e9afca35590f76fe8930c73af4fa35fb796e819ca6d7219bd7ba1a0a6bcf3e8d76e9d873a078d74857a2318f8bbc3eca34c051a9ca4d41
-
SSDEEP
49152:27mrmYPoEHVGTWFkO4ITVpSuECY/vrM3rA3SuNM:Nm2Z12WFYFJ+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation $_3_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 $_3_.exe 1168 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1168 $_3_.exe 1168 $_3_.exe 1168 $_3_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1496 1168 $_3_.exe 90 PID 1168 wrote to memory of 1496 1168 $_3_.exe 90 PID 1168 wrote to memory of 1496 1168 $_3_.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8044.bat" "C:\Users\Admin\AppData\Local\Temp\E5CD8FE835C54249A0A68B48771BA40A\""2⤵PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD58a450cf61a4989eea236f07c354d786c
SHA13919076eb6edd33e9e0c95f350b84b7c987dfed2
SHA256415fe55dc955e2520ea5d32fe425ab127bcac1995bc4909b6bf8b6b6a698420f
SHA5129cf444e8c04cbf46f3147251009e26e62abbaef74446fe7cb7e5aae13f79851270b50e27dce1316c306262e1193ae95990df3d23ade7a172cb4718d5eeb0a57c
-
Filesize
96B
MD583ca98fb4433d65af512ba371a4b9800
SHA15a867b15dc3faf025c783c94a9c4dc66141b6dca
SHA25689949ee94d18e5ce0d8b6fcc2d2ed88737759cc7ca9cc903114db8e3f158564f
SHA51277b571c4813e653b470b69824012a7c7ffa9d40fd2955b2a3b89e296212cd86cb268c3080ab50410dfa283544c0450ff3011ddeca82724f5e6d052668a459483
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\E5CD8FE835C54249A0A68B48771BA40A\E5CD8FE835C54249A0A68B48771BA40A_LogFile.txt
Filesize1KB
MD5cba6ab02f06bb873e1ca7da236556715
SHA117ba295c9c4f2d22c83136950b8fa3743a17bfa0
SHA2560aad87e04957d9c2f473970181e5ceb704fd95c1f674ea351705a61cf4ba6a26
SHA512ae18dbfbd6a31ce3a27906dd8bc8aea021bf4f7993471e0a86179d1c13c45bf5dc33295838cce3aa85f0a892248bf66ce6f53f7b89b6abb5f98abb8819ad7dcf
-
C:\Users\Admin\AppData\Local\Temp\E5CD8FE835C54249A0A68B48771BA40A\E5CD8FE835C54249A0A68B48771BA40A_LogFile.txt
Filesize2KB
MD583660cb8b897cfadb503519345d4924c
SHA1fbd2c0d19b3a6418b34d18efce81adc70ba013a4
SHA256626dd535f85e078232490d849c52697bd2566700c9721e80d0fa2c7fefc905dd
SHA512e39cc49c5395b02710757dbe61e708745ca80869d9fe2fe9983f62feaeae189f07c0b9b4bd3f125128002820250f12cfdcfcbf16ce3fd9b147cd53c772ac1502
-
C:\Users\Admin\AppData\Local\Temp\E5CD8FE835C54249A0A68B48771BA40A\E5CD8FE835C54249A0A68B48771BA40A_LogFile.txt
Filesize3KB
MD55a7463263e8e179b012db865853958ea
SHA1e08a7a38300f722c5de7b1cc715891539b016858
SHA2566768e2bb5e61040664bfc90aeecc9acb2f8473121b9b2a7822f4bdfa082ae42e
SHA5127bfc5e42d3741b394c154c775b9c9c70e0d82722186aeb3ebaaaf036675ee7acbf6e825440021ed8052f690e14eaa0fbaca50d9a68004a49cba29aacbdca4fc2
-
C:\Users\Admin\AppData\Local\Temp\E5CD8FE835C54249A0A68B48771BA40A\E5CD8FE835C54249A0A68B48771BA40A_LogFile.txt
Filesize670B
MD535d695fabdaa56860aa137885c0b3d2e
SHA1def8e4f06e793ba56850ab5d56458b458aad3ed0
SHA2560d5c2e07d2e7be35755a4d33298c1bc989c061cf7182357b0e20e1937fa6c65a
SHA512c14415dfb2c6e152e7a65f1c389c96c0c0231028bde09034b24dbe7e9f919b0b98d23bff003f9851d5f829e7bbd163ad088ce4a123687d607441813d9a6ab9a2
-
C:\Users\Admin\AppData\Local\Temp\E5CD8FE835C54249A0A68B48771BA40A\E5CD8FE835C54249A0A68B48771BA40A_LogFile.txt
Filesize4KB
MD57bdb0a921a4adab7aad2754f6211d918
SHA1359aae4c5921ab6461f6c259772c7e46d8f8c249
SHA256a35e490d887936fe867296be598ef73f76d117b6108eb06ed6d9d18999061a6c
SHA5128d68c6afaed62356886455d242758d2f91ecb6f6629cdda2eb6ec247810da302b7b429a0994a422df41aa9d1d62be268839ef8ea684559fd8c5a2052842c0267
-
Filesize
30KB
MD544e12c55e4c15108a91d15bf95200961
SHA1da932e041414ea4dcbfc3ab1b53811f5b4482822
SHA256384053abb51c1ceb839f56c1877b48b6834f03a28b681b3051d995aedda0833b
SHA512aca6f0edbfaad40bbcf6b986e70612ba5bc64fb52deb884cd61c5006bb89bd775e0ba20b5996fe04d785083a83c94d4e755213b1c5743bcd7f6d932b3ea26a0b