Analysis

  • max time kernel
    138s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 22:52

General

  • Target

    00fef7886caa2ee8d22e3ce5ba7270d3_JaffaCakes118.exe

  • Size

    21KB

  • MD5

    00fef7886caa2ee8d22e3ce5ba7270d3

  • SHA1

    7ee7d2267dabfed01c64d5bb267c8cb9b02d021e

  • SHA256

    400a94823bc30ce9d4a18152695b67a661ec078459131f202163006d14868313

  • SHA512

    2b0fb86bbddbb5cce4160bb02e3c0fbe9fcc9cd9f64ad1b75a2e95cdf456740f23410aa60599a4631756929b6093b2f81386d55439f114c105ab8d322d1b913f

  • SSDEEP

    384:MF2+UssdEGs1mNuVNCX2tnAFHUIamB9Ay4jqLTdP0mU42e+4iFAZ:Mw+ps214uVN/AF0IamrAr8RXU4n+94

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00fef7886caa2ee8d22e3ce5ba7270d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00fef7886caa2ee8d22e3ce5ba7270d3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\00FEF7~1.EXE >> NUL
      2⤵
        PID:2524
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,2029050989380753659,15333598055019363793,262144 --variations-seed-version --mojo-platform-channel-handle=4136 /prefetch:8
      1⤵
        PID:2620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\29EA67E0.dll

        Filesize

        13KB

        MD5

        d5d146541b29693084426d88be6ec264

        SHA1

        8e4aafc77fa63d8e11a4d707ce0b756c4c2692b0

        SHA256

        75129dbae1819826d1009f655d9954e0beab00a402de14a816c598383b241da5

        SHA512

        e443cb9f0af2d4452ba721539a76c8fda1f0275d44a76f3e2c39aabb5ccef2a8b7b7d916d94ce525d9c586e90e65840f1ae82fa47b94ef9709285fc9412af0db

      • memory/2536-8-0x0000000010000000-0x0000000010017000-memory.dmp

        Filesize

        92KB

      • memory/2536-9-0x0000000010000000-0x0000000010017000-memory.dmp

        Filesize

        92KB