Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 15:11

General

  • Target

    167895353a6604de58f25c04411d1b28_JaffaCakes118.exe

  • Size

    27KB

  • MD5

    167895353a6604de58f25c04411d1b28

  • SHA1

    5951d5cc08421c4983395b05bddc93e5c406a06a

  • SHA256

    9986fa3c2ada87724d8c196ea39750995f5f6aba7e990c0247f4a02622ff6718

  • SHA512

    9932aa7fa03459d20c8d6d154abf59e9c0fbc5f8ad28c050903d8d99664da0d0e759b26e5a62469ef7a0352434fd506c005d0454bd7899447020d5c3aa97c766

  • SSDEEP

    384:1Cv8NjS0wMfm4ZXJZyDs4C/6MyKzlX0t5SFMGDeMElby9V1vvz:SIOEotLR8NHDrpvb

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\167895353a6604de58f25c04411d1b28_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\167895353a6604de58f25c04411d1b28_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\decrypted.exe
      "C:\Users\Admin\AppData\Local\Temp\decrypted.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\decrypted.exe

    Filesize

    7KB

    MD5

    06e439cdc92d96d540f4ea5c3afd34d3

    SHA1

    8b951912ceff29f0f6454a602a8078e6db65a9a7

    SHA256

    f0d55d102598718ef3fa76f54b3eecca484d03e251ab64990e9dd3ce0798e9ed

    SHA512

    3a7ed6805a662829c32d19f29e5fbf97c645735d775bc18d96e13c57ff788ba27e3b36afc46bcdc940e6c74ed06f26067a0cdb17a24c2ef09c9c599ff02caa31

  • memory/1392-10-0x0000000000400000-0x0000000000401E00-memory.dmp

    Filesize

    7KB