Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 05:45

General

  • Target

    0cde62c97f0e154aedebb93144f71b5d_JaffaCakes118.exe

  • Size

    328KB

  • MD5

    0cde62c97f0e154aedebb93144f71b5d

  • SHA1

    b784e43eda015badc9b85bdcd208045345f2183d

  • SHA256

    070cdaafc8e55e13d001c55041ba9e0bfc1075a69b121b9631cbebf273552864

  • SHA512

    e0beb59d0b628dd7e893d2351ae24ba2c77a4fa4adbc6569290aea8afcc07582e6cab4343585fbd82ab4cfaf1dd94dcfcc00dda0dbef4b2c67b9447164301f18

  • SSDEEP

    3072:3jtj5Tbd6mF0yQBVdJxPUpjtj5Tbd6mF0yQBVdJxPUv90:BZf6BD3s3Zf6BD3sv9

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cde62c97f0e154aedebb93144f71b5d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0cde62c97f0e154aedebb93144f71b5d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.exe

    Filesize

    154KB

    MD5

    35dfb012c9b30db38b9b44dae9f30ff7

    SHA1

    16351bda948b1ffbbed190ccd6bed27b99897ed4

    SHA256

    524aa85d541420e324765aad5b03c26edf29f9f30174495bbca8754befded29b

    SHA512

    395d0bfbc04efa5a3ab992029759a443c23a79ad4108025c87244927dddb3fe77ac7f53087685cb1d6090e7ab53c7bed211d0607c3d30ad2835a63177e03e79e

  • memory/1032-21-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-22-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-31-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-30-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-16-0x000000001BF90000-0x000000001C45E000-memory.dmp

    Filesize

    4.8MB

  • memory/1032-17-0x000000001C530000-0x000000001C5CC000-memory.dmp

    Filesize

    624KB

  • memory/1032-18-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-19-0x00000000014D0000-0x00000000014D8000-memory.dmp

    Filesize

    32KB

  • memory/1032-29-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-20-0x000000001C690000-0x000000001C6DC000-memory.dmp

    Filesize

    304KB

  • memory/1032-15-0x000000001B9B0000-0x000000001BA56000-memory.dmp

    Filesize

    664KB

  • memory/1032-24-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-25-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/1032-28-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/3984-27-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/3984-26-0x00007FFA95875000-0x00007FFA95876000-memory.dmp

    Filesize

    4KB

  • memory/3984-4-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB

  • memory/3984-0-0x00007FFA95875000-0x00007FFA95876000-memory.dmp

    Filesize

    4KB

  • memory/3984-3-0x00007FFA955C0000-0x00007FFA95F61000-memory.dmp

    Filesize

    9.6MB