Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 10:11

General

  • Target

    0dad0c6429468124a48228944011ab55_JaffaCakes118.exe

  • Size

    7KB

  • MD5

    0dad0c6429468124a48228944011ab55

  • SHA1

    c0722e1c36fbc95eff262952a07a1fe38b38b40b

  • SHA256

    5c49d33bebff5bc7bfa27b85a99065792fc8a2a663c495a59185a552d2f2ec32

  • SHA512

    7c2675d36a6e5fe8cfdafef41a5da6c2ce8394d861576b4128f1607138e6e26f7df6ad4a228cfab2aedb593884ec22605781fc8c57715930c066f30d1e1e8465

  • SSDEEP

    192:aS85Zl/9KzgoZk7jkWt9dyyYU/lYwEJiD:QB18zZMddyyYUdYwiA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dad0c6429468124a48228944011ab55_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0dad0c6429468124a48228944011ab55_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\ichcbc.dll,Set1
      2⤵
        PID:4964
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d.bat" "
        2⤵
          PID:1560

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\d.bat

        Filesize

        210B

        MD5

        bd6e2760d624d85ac35811959cac7d19

        SHA1

        a6c0f5fc3821cf24cb69c68b64356a15fd96f32e

        SHA256

        f78378c8080088d391fcf0db618d6214f206c8f5cc4b6b3588e6ca8ad5c442ad

        SHA512

        ad3cae2fcc68fe33829c234b29ae592d253c0102a69038610ea015c5761e7ff8fe3beecd172d7e3b81e796a57d05b73b5791ae1702edded1c76a7a1337adfc7c

      • C:\Users\Admin\AppData\Local\Temp\ichcbc.dll

        Filesize

        9B

        MD5

        1f1f78ba0b98e90a846613acac01651c

        SHA1

        d03c4441d921b02eea4737f72b4cf4639fb578e2

        SHA256

        1ff7ed940bfcae7ede9379da47905c1dc7f6ea65a15260525d192a56883cdb95

        SHA512

        53c5447a830a9a710dc82cc27dfc661de727f1d09c3ca803144246d8828aa333d112f47153432a0b2b9dbd15e2840d4cc7763d7524537298ebde2c00904ab7d8