Analysis

  • max time kernel
    140s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 13:15

General

  • Target

    08bacae716ba502bc6aee2782629cc1b_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    08bacae716ba502bc6aee2782629cc1b

  • SHA1

    5851e7d564bcb74eab1190cc928fc88d5abad8e5

  • SHA256

    d0d49c22f10e285ebf332e4d6e73ff4864c32b73dd1e4d1d09e9b34c376bea8c

  • SHA512

    0bd4c2bfb0d8af969a7215aca506a4b1f3f3918e5e97d4cbef402cccfecd345ae8a432f40c3e9955be24ab3ecf520d625afe51df4fe5f4a9b7324c6166e9b51a

  • SSDEEP

    1536:rg39tJppQx/Iy1nBxbm0JE/s+sCJOus20mRuYWL:M39c39v+sCJDluYWL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08bacae716ba502bc6aee2782629cc1b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08bacae716ba502bc6aee2782629cc1b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\msiconf.exe
      C:\Windows\system32\msiconf.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:2448
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\08BACA~1.EXE >> nul
      2⤵
        PID:3868

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Thumbs.db

            Filesize

            14B

            MD5

            0b486f358be963eb0a6329d2479cb669

            SHA1

            6c38b3d075ade9f9ef2568367e1f93792dba2d2f

            SHA256

            9896e025830d7eedb88fe82f73e437718064c194417c552d08e4bdb866d65a67

            SHA512

            9bc14284beac4070b688e23f5ea9eb28b8f8e39bf3e0efa223747498777d5060bf3f7e723fcd2a5d355293587f113738afc8c0293087a7ba51ffcf327bff8bbf

          • C:\Windows\SysWOW64\msiconf.exe

            Filesize

            81KB

            MD5

            08bacae716ba502bc6aee2782629cc1b

            SHA1

            5851e7d564bcb74eab1190cc928fc88d5abad8e5

            SHA256

            d0d49c22f10e285ebf332e4d6e73ff4864c32b73dd1e4d1d09e9b34c376bea8c

            SHA512

            0bd4c2bfb0d8af969a7215aca506a4b1f3f3918e5e97d4cbef402cccfecd345ae8a432f40c3e9955be24ab3ecf520d625afe51df4fe5f4a9b7324c6166e9b51a

          • memory/2448-14-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4628-2-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4628-0-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4628-1-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4628-12-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB