Analysis

  • max time kernel
    130s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 03:33

General

  • Target

    18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe

  • Size

    984KB

  • MD5

    18a15ee4a5bf899e48ef481d8f48437b

  • SHA1

    9f64797d2393edf76fcb9c07d7c2d4a6e54bd422

  • SHA256

    de4dff738072a634b37b86d5ecd4409f00974cd64498288f85cb1fffe15ca2ee

  • SHA512

    ec9ec1a9759529e1a57d000ffb47e3715649835b863e63e6fc85b0d4d759494888ee71ebb625fe7c41144bbd005adfb79fb9913ce040194d05f930aebe5dc476

  • SSDEEP

    12288:gLCS+qQ6Le8SP7J4pL4ij3MqdmZTWzwLqPj3MqdmZTWzwLqCoKJW:4Qn3mLvL2TjLqrL2TjLqM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      PID:2112
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3916
      • C:\Users\Admin\AppData\Local\Temp\J9R9He.exe
        "C:\Users\Admin\AppData\Local\Temp\J9R9He.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Users\Admin\AppData\Local\Temp\J9R9He.exe
          "C:\Users\Admin\AppData\Local\Temp\J9R9He.exe"
          4⤵
          • Executes dropped EXE
          PID:640
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 308
            5⤵
            • Program crash
            PID:2556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 640 -ip 640
    1⤵
      PID:3884
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4236,i,1400471177590024469,587385956640537806,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8
      1⤵
        PID:4124

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        511KB

        MD5

        b865767be273a4b1576aa331341d8d70

        SHA1

        dfe05304d4ae10098da13b39f7b8f38dd2fbad4a

        SHA256

        e755b7cb542126f83c0647205a21a98f9c90265e68307f6a5ab2f26671a6c01d

        SHA512

        6ade746e9945a28cceb1c4e2a6f1aa833c86fe3e5c77ecc28c6983e72819d9d5617cc492930f86224364063548972f723d66ea8b44c5928475f79c41e2cd63bc

      • C:\Users\Admin\AppData\Local\Temp\2.exe

        Filesize

        332KB

        MD5

        389c696ef3f1c33bf5c72fc037bc925a

        SHA1

        eae6a95218de680108cfb8f4c0aa01520421b3bf

        SHA256

        ac7e98bc5e43e88c12b7083684dedc4d8636ff7a815341ad6d52b8ceb1f3fc50

        SHA512

        9e636f447422a4d611de4fa26a741d78677b61cabe8219ca9385a2f520369255c345fd3b731dea6e18d1b3dacb25009ebd3cab653a006c41d69459a81d242b32

      • C:\Users\Admin\AppData\Local\Temp\J9R9He.exe

        Filesize

        112KB

        MD5

        f5fa69d30406fe5cd89bb9c559703399

        SHA1

        57114f7755e028d2dfe1415f5f15a40ec48b3a2d

        SHA256

        4a7683ba19e99f250508b1ce491c1d14bf9bee751b96264b4ac5b9d832f56842

        SHA512

        fbfb3844ab5168c57fb142520a95b14e228950d1f6780198c1336da992cb8166c33df6f9181c831bc821ec17963e1e3bdaa75d6a2e67dee68223077f0bc59d5e

      • memory/640-46-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/640-44-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/640-48-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/2112-22-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/2112-29-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/2112-31-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/2112-25-0x000000001BA00000-0x000000001BA9C000-memory.dmp

        Filesize

        624KB

      • memory/2112-47-0x000000001BAA0000-0x000000001BAA8000-memory.dmp

        Filesize

        32KB

      • memory/2112-24-0x000000001BFE0000-0x000000001C4AE000-memory.dmp

        Filesize

        4.8MB

      • memory/2112-50-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/3484-4-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/3484-30-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/3484-3-0x00007FFAE94E0000-0x00007FFAE9E81000-memory.dmp

        Filesize

        9.6MB

      • memory/3484-0-0x00007FFAE9795000-0x00007FFAE9796000-memory.dmp

        Filesize

        4KB