Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 16:54

General

  • Target

    0ed40792dc8e2de61899d4283bde5287_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    0ed40792dc8e2de61899d4283bde5287

  • SHA1

    14441d782b1e9a310d608e2683249a9fbe1b0273

  • SHA256

    be393e789497efdf46b874a5f4fd239b3cb9782819a0d60a866966b396dcf4c2

  • SHA512

    bc5c8e44b57459f0902c892a8d52f21dc9b85a484e495dd12138aa59297513436de877d6b0645b39a309035827c38b3a14387fbf2b234d940f8cb9692d12e26c

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhRs:hDXWipuE+K3/SSHgxo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ed40792dc8e2de61899d4283bde5287_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ed40792dc8e2de61899d4283bde5287_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Users\Admin\AppData\Local\Temp\DEM55FF.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM55FF.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\DEMAD18.exe
        "C:\Users\Admin\AppData\Local\Temp\DEMAD18.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3592
        • C:\Users\Admin\AppData\Local\Temp\DEM3C4.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM3C4.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4904
          • C:\Users\Admin\AppData\Local\Temp\DEM5985.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM5985.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1852
            • C:\Users\Admin\AppData\Local\Temp\DEMAF85.exe
              "C:\Users\Admin\AppData\Local\Temp\DEMAF85.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:5076
              • C:\Users\Admin\AppData\Local\Temp\DEM620.exe
                "C:\Users\Admin\AppData\Local\Temp\DEM620.exe"
                7⤵
                • Executes dropped EXE
                PID:4016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DEM3C4.exe

          Filesize

          14KB

          MD5

          218f7c0f4970c61f8527be2aa87a1c14

          SHA1

          8b30b8c0a9c66ee4132fb817fb97dbd873baa6c0

          SHA256

          fdd3a47ad529e49b116235f1a5a2abeb1e0b6222afeb8361a5aabd49301afffd

          SHA512

          d8ef7c79d175080888d5117c653853b519b587f27b884818ad98bea74e3bc9a2cb1739214953312f4dc619f4149e69ccc7e48751aa1b74d3b59f7f1a5cf9f54e

        • C:\Users\Admin\AppData\Local\Temp\DEM55FF.exe

          Filesize

          14KB

          MD5

          16f403cffcb50f50415eaf63894f330b

          SHA1

          1d2bcf6c0846ff5bb0123f898c1c108a5c304f06

          SHA256

          5d921f2c45162743c854c27e017d4289541f1e3db39f1b8feedb00589c32b5af

          SHA512

          c30f222a49805e7a86c970c2ab1b83e62eb3ab0f645ed823cf3b9d6c9c960e87f7da670b339fb89d6b1c2d527b448d80d27441afcee4b61a2e452d7d38a9c098

        • C:\Users\Admin\AppData\Local\Temp\DEM5985.exe

          Filesize

          14KB

          MD5

          f4a0c8cbef7205877c4c8778bcf0df50

          SHA1

          2266d6958ccbf7536d6518cab17f6ccbcaf120bf

          SHA256

          6481dff74ead64ab55b2cb43c3b2cfa23d4ff0e3c5a99980fe92041887eaff1f

          SHA512

          82f90973f743a1644994cf5b16c1104f005a968664ffaf35014951e7809fec9d0f03162c2bf57447d92f5f4071237142f3d0aeae95ce271de7b758ea5ccb649c

        • C:\Users\Admin\AppData\Local\Temp\DEM620.exe

          Filesize

          14KB

          MD5

          82c7144d41687a61f680d3c6af75a323

          SHA1

          0e557e00e8761693d3c1b1460b6e616ff501aefc

          SHA256

          52bc76b8eca6be9adb828c6526821ede05778ead28f59661c6ab3834c2308319

          SHA512

          6b2c28cb1c572c6f30a05db33250297eb46cb51f198c6f17068b277a7ec8bbc651cf2dab64f374f8dbc1e0b61e530d1f47a934d051062740f3f6fc641e686619

        • C:\Users\Admin\AppData\Local\Temp\DEMAD18.exe

          Filesize

          14KB

          MD5

          173bed213b3e7d246b483119701a3389

          SHA1

          d4d3ebf225a8f065f4ac7303fba2922ccd5d1108

          SHA256

          abafb8d1828a2730afd3dc3c497b8adf8ded11a42f706f0746a011189fbd9461

          SHA512

          a40b95f56541a231b97d004485f098cb10b410f47e897a1346d5255ced25fa2928e0f2b1fe64b3f4f266ecb094a46a275c9af20cc57ac2b13107e0097f20fa70

        • C:\Users\Admin\AppData\Local\Temp\DEMAF85.exe

          Filesize

          14KB

          MD5

          baf085735a29100a4fa3dfbcb53b7f88

          SHA1

          138008a49047b0f519aa00c4569fb0ea1c1eaafe

          SHA256

          2b6b020f2b830fdf0c3231c7fa4b70794205ea0e8e5b7d76a1aa74de36a16dbe

          SHA512

          752ded723baf659ec916907ba2f7f573e35366616f4e8ea594ed4c4b73537e3a93bc3cc9c90f21cccb34477973002cc1590a8813e5201c8d719d64938b8f9e33