Analysis

  • max time kernel
    144s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 06:59

General

  • Target

    03d71cdb29edbf07cae4bbf7de6f64a1_JaffaCakes118.exe

  • Size

    532KB

  • MD5

    03d71cdb29edbf07cae4bbf7de6f64a1

  • SHA1

    8739b30728e02f166dffae891a6770cf86f4fa21

  • SHA256

    539dc9e548a53103e1022195de96cab3d85eaa97c470c9a98c2ee696d091622e

  • SHA512

    183823f03f0c38943a0b9dc2ec2e17192c8e57da0e14a7ecd35cc24753b41c05bb6e7c505f1ad3c62dcd6a84bd05caa4d2b5a54aa035a497830ca10e2c1f6641

  • SSDEEP

    3072:huFAlQ80NH5ZVulAOL8OzsFxEgCBVa0edQOcJq99zgcRLQaA9waC:UHNH5ZA8vIwQOb99zMdw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d71cdb29edbf07cae4bbf7de6f64a1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03d71cdb29edbf07cae4bbf7de6f64a1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\03d71cdb29edbf07cae4bbf7de6f64a1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\03d71cdb29edbf07cae4bbf7de6f64a1_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe

    Filesize

    532KB

    MD5

    03d71cdb29edbf07cae4bbf7de6f64a1

    SHA1

    8739b30728e02f166dffae891a6770cf86f4fa21

    SHA256

    539dc9e548a53103e1022195de96cab3d85eaa97c470c9a98c2ee696d091622e

    SHA512

    183823f03f0c38943a0b9dc2ec2e17192c8e57da0e14a7ecd35cc24753b41c05bb6e7c505f1ad3c62dcd6a84bd05caa4d2b5a54aa035a497830ca10e2c1f6641

  • memory/1560-84-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1560-83-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1560-81-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1560-78-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1560-79-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2456-0-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2456-10-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2980-80-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2980-73-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3488-11-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3488-9-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3488-6-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3488-5-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3488-3-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3488-4-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB