Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 15:59

General

  • Target

    078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe

  • Size

    114KB

  • MD5

    078540aae55d331d7df9a90c577d13d4

  • SHA1

    9b6a072a76000af1feec402cb3936430a62de44d

  • SHA256

    d84e5ce07c118f596579b199f906cbc889b87ac02f73ea80cfee2aef4eeeca0c

  • SHA512

    3a710ef228413b13e9d7568eca65c338b33d9dc702ffa270317a10dc81c2149718e2fa7cdb9edcc54f7b0ba1aadd2e3c0452c52a7082ed039abc03172635e8d1

  • SSDEEP

    1536:sSmg5Tf9u8/DtO6PMMy7k+EMvOEZznJiuWpqDGx0bC1PWot3Cvc9hcsu:s7gZfY05HFR+ZrDJiuWwc0bCJ3Z9ab

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\EL.EXE
      "C:\Users\Admin\AppData\Local\Temp\EL.EXE"
      2⤵
      • Executes dropped EXE
      PID:1416
    • C:\Users\Admin\AppData\Local\Temp\x0nE.exe
      "C:\Users\Admin\AppData\Local\Temp\x0nE.exe"
      2⤵
      • Executes dropped EXE
      PID:2368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 272
        3⤵
        • Program crash
        PID:3328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 300
        3⤵
        • Program crash
        PID:2060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2368 -ip 2368
    1⤵
      PID:1104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2368 -ip 2368
      1⤵
        PID:1452

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\EL.EXE

              Filesize

              8KB

              MD5

              3dffac1a5aa8a2fda29ed341dd11323d

              SHA1

              ca561a0f917ad334c7c0a88cf76fa7cf89e7e17c

              SHA256

              f8996cd7ddedb7e8a136f6d99f5fdfa9c2904a248d70136e05a4e702630d64ff

              SHA512

              a45eb89aa432e6299affa3b70ad40794b46077e4b3e97644bfac3a3a29de67e7fc20d97521aebb7f690b598be60985a9ee554b32bdc205d59ce1091ec159ee8f

            • C:\Users\Admin\AppData\Local\Temp\x0nE.exe

              Filesize

              79KB

              MD5

              1ec7a82515b1380b87d0abf49aadc04d

              SHA1

              9cd193178ae7f0eb04b28e9ddcd536cf612d205f

              SHA256

              29f1036874b242ac136030ab0f5777eff721b42783a4a08e0c8a608bd4f67039

              SHA512

              3b8d340d55c24a17d6c97a7f0b9297856dc574e93e751eca516f3480d929c51e18865467c1d214a48c64bbf982e5e269e68eb70d7c0d9bcbf67049bf6be69ed9

            • memory/2368-16-0x0000000044440000-0x0000000044457000-memory.dmp

              Filesize

              92KB