Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 11:04

General

  • Target

    0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe

  • Size

    697KB

  • MD5

    0dd470c6f38a028c3e868f43d7c98601

  • SHA1

    e8626b3559ca5ba98b9222645d39aed65ce20a9e

  • SHA256

    8645f1bea94d8d6f2f176eb7a3f85a4efe6a61c685f2593d5abf90496fcc789e

  • SHA512

    c90eb664d7558c519c1120204d2beeda68d2b87bab8c2d50420ed9500c9aef986ec80b9fc340d6bfdbe5409b89aa1f15279e683c69b3a85cb70c5082ca851d95

  • SSDEEP

    12288:onAtofebZ2gup38/Lny+t1tWvIGRSE3HpmxG:oBfQ/28TyMtWDSBxG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\Searcher_GM-MOD.exe
      "C:\Users\Admin\AppData\Local\Temp\Searcher_GM-MOD.exe"
      2⤵
      • Executes dropped EXE
      PID:5012
    • C:\Users\Admin\AppData\Local\Temp\SinoniaLoader.exe
      "C:\Users\Admin\AppData\Local\Temp\SinoniaLoader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f /im gbpsv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\FirewallControlPanel.dll,ShowWarningDialog "C:\Users\Admin\AppData\Local\Temp\0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe"
    1⤵
    • Modifies registry class
    PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Searcher_GM-MOD.exe

    Filesize

    612KB

    MD5

    7c20baf6618de98abaa9f02aba052e65

    SHA1

    219a40030343dddefee4409d419ded6330f565a1

    SHA256

    2d730895e7357af2baaf7c17c0c4ff3c3813afce98c546500565f750cc3773b0

    SHA512

    592e272ab515d3e0ef300de46b6090fabd02833c6c6e5a41671478f99c8388cec99a6651361c0edb9ab49d1f5c154e75d321010a3b335b1fa5cd2d39d0b84e14

  • C:\Users\Admin\AppData\Local\Temp\SinoniaLoader.exe

    Filesize

    41KB

    MD5

    19a80e157bcd70fc3487737ddac75f3a

    SHA1

    4d41d4e43dc542c7d707f3340aebe4842fada731

    SHA256

    69c535c09928c62460a0787f91380c0116bf7a7d45b96806dab621cc3286c1c9

    SHA512

    22ee04c95d3a4b8d713028b96d1ae8d9eb91b1428943f6912b9157eceb546bd8d3a7fef8282d982bd3e11fca50bd6c326ebc99c6afdec72b336cd6a8c4c10186

  • memory/1512-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1512-20-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2044-21-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/5012-22-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB