Analysis

  • max time kernel
    134s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 01:25

General

  • Target

    184896f403bceb6f7b1db26208df800b_JaffaCakes118.exe

  • Size

    23KB

  • MD5

    184896f403bceb6f7b1db26208df800b

  • SHA1

    03f40ff6ff6ad26e046e2ff34d9149469b4b0128

  • SHA256

    225bf460a0c2e3d00f7a6679d10764dc60a0e9510c8e30a99602d4328cf21922

  • SHA512

    d7ce186146f74e0f25b4c629e733e952c66aca5fdb2d5e3647bda3ac6e624012a7357c6141639f781cd43c306d1bbe13dff94bee1f337240a12c87164e14a47a

  • SSDEEP

    192:EB5W66P1oynPh489jvy5SoOpMP1oynpaRM3RdjE5norY6BZQbmuPrQe2rP:EBQ6E15h4QGkG1iR8RdjE5nosSZU5ryL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 25 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\184896f403bceb6f7b1db26208df800b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\184896f403bceb6f7b1db26208df800b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\WINDOWS\Temp\ialxokta.vbs"
      2⤵
        PID:1704
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\WINDOWS\Temp\ialxoktb.vbs"
        2⤵
          PID:724
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\WINDOWS\Temp\ialxoktc.vbs"
          2⤵
          • Modifies registry class
          PID:1276
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\WINDOWS\Temp\pag5.vbs"
          2⤵
            PID:3580
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\WINDOWS\Temp\pag4.vbs"
            2⤵
              PID:2372
            • C:\WINDOWS\Temp\wddn.exe
              "C:\WINDOWS\Temp\wddn.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:532
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\resgfvr.bat" "
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2136
                • C:\Windows\SysWOW64\reg.exe
                  REG Add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\ /ve /f
                  4⤵
                  • Modifies registry key
                  PID:2036
                • C:\Windows\SysWOW64\reg.exe
                  REG Add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{C42EB5A1-0EED-E549-91B0-153485860982}\ /ve /f
                  4⤵
                  • Modifies registry key
                  PID:4648
                • C:\Windows\SysWOW64\reg.exe
                  REG Add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{C42EB5A1-0EED-E549-91B0-153485753982}\ /ve /f
                  4⤵
                  • Modifies registry key
                  PID:4428

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\resgfvr.bat

                  Filesize

                  349B

                  MD5

                  2cc8a7df501e72e6c0abaeea8dd74cd3

                  SHA1

                  d695c0e03d920d6ae450e19730025305b16d707e

                  SHA256

                  9e7b8e8f9e470920847067edc78b86afb7afc3ea74f45b2f7d5dd9b7d70463e5

                  SHA512

                  b5c4590c35ab3545b12da7b49a0b67d093bd2aab9d69999edec1403f03784ccb7fe7dba3894810308fbe9795f4f627279073501745655918437c54e079dc6aad

                • C:\WINDOWS\Temp\ialxokta.vbs

                  Filesize

                  3KB

                  MD5

                  dc1294b39c88f4f392a8fbb14d882783

                  SHA1

                  66d581822c9e61a1c5e12392b051e66fcd9b15b0

                  SHA256

                  81e620210cf2658b1223fbf99cc7d2c0ea832bf28dff7b8ad13ca217f15d0e33

                  SHA512

                  f25ffb812461b5451f4782953af710f958d77be1c94d568784d26e84dbc0c34f379b8f17ed58ee1c8425b89cb054b8da7fe6472eac2be652038a753a17a69da0

                • C:\WINDOWS\Temp\ialxoktb.vbs

                  Filesize

                  3KB

                  MD5

                  02c167ea7c31d88efe9160d86acb4de4

                  SHA1

                  ab7ea1aecc2e82aaa3f62863cf81178d86f3208f

                  SHA256

                  a6a2d1cafd16736f30f932403ad65aa688b561c04d9b69b18342392fb3226e1e

                  SHA512

                  a850f3339dfeb9aab29062d08b363c4b48e92a9f38ce532db6a42882469846412769a0f8e77877364665ad730894c3c2f08a31087367c28099960f7c4f617892

                • C:\WINDOWS\Temp\ialxoktc.vbs

                  Filesize

                  1KB

                  MD5

                  27f2f7fe0ec5470ca302c42e25e3ee03

                  SHA1

                  3a3eedb51311f14de20b2c1300a10c431477f9ea

                  SHA256

                  d7e63b4cd0a63239fb274e7b14218ab05b99bd7cf4a6efc6675d8aed70c193a7

                  SHA512

                  bd367259068b974f1f1bbe79eb087b998a49bb259ca391e24b2b30410eb0fc329704aef0e5b5a72a943b86bd8e73fb93d8b4e992c8a4202f2e8c80a600a6ae2d

                • C:\WINDOWS\Temp\pag4.vbs

                  Filesize

                  408B

                  MD5

                  03d352776bce016a22c2264cde64b6af

                  SHA1

                  b8069c81d23b323eac848d240b31e3afcb018537

                  SHA256

                  777e6484309325088372dc22f82b6fadef88c3cfbfe9da10bd7e5a7575f26627

                  SHA512

                  e8f55f40d421cdc495098f2a5aead17b36b9c16bfbff1f619e32e06095a23a58fcd09c31eb9f4c2d97ef5c042749ed7e79cc402807c03a7609ce5ff00c1c6d04

                • C:\WINDOWS\Temp\pag5.vbs

                  Filesize

                  407B

                  MD5

                  dcd95ffc282549e2797867802ec669ce

                  SHA1

                  a8af057a834e6e7a7c5eb4578738e2cda5a3610d

                  SHA256

                  3c8f5624fae51726e34d7f9bf1c702fc97bf644bb3312bf24c94e758271334b3

                  SHA512

                  c28149fc6163003a2c56e5544d3db121baef24a0a2fea9b64d5aa753ddcc7c66c31cc2a08e13d14dcfa73ba98506823e05ea82fa89e2945f6ca7e79122f9f354

                • C:\Windows\Temp\wddn.exe

                  Filesize

                  3KB

                  MD5

                  943d001eba075026382a0d220e2d8db5

                  SHA1

                  755861a206edb5f5e31bb7a1fc5e6648a62d43bc

                  SHA256

                  608555cdf808d3a449c5d7516ca13d2038aaf0869c109b75cc3a0a072ef2872f

                  SHA512

                  d2c9bc3192a1cc535c03fd020f0cf7127d628d89eb8d27449ad3c32160122109f0bdfeb0d517f2f0f1e85529da27a16530ac37d45ff3c98b0fe24ca7fc42eb14

                • memory/532-32-0x0000000000400000-0x0000000000400F70-memory.dmp

                  Filesize

                  3KB

                • memory/2652-28-0x0000000000400000-0x0000000000405F60-memory.dmp

                  Filesize

                  23KB