Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 02:51

General

  • Target

    1885ac32164a3c3fb975282fd657af8b_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    1885ac32164a3c3fb975282fd657af8b

  • SHA1

    4fa06d53f0fb773eebfb57ec9ce59da866821daf

  • SHA256

    be72468b4c52745c92edfeb0668423da6ff8313237eeb18668913ec7a479ebf0

  • SHA512

    85a7b0f4a85f3e16bec4dc35bce6e289869445f705d817e25029d87998af6b2094fd28b28836990dc5582141cd4c4e50befa989487e243ddfcf3581eba1100ec

  • SSDEEP

    384:Gr9MUfDopREmd3yghuQtmJuLnfGFpm4ZNPq53m6Cjyg/v1PwJA3d7i4C+zrZ1xV4:Kzf01JyrlJUf8pmD+G0gKxydcXFy/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1885ac32164a3c3fb975282fd657af8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1885ac32164a3c3fb975282fd657af8b_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1885AC~1.EXE >> NUL
      2⤵
        PID:3272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/376-0-0x0000000002010000-0x0000000002014000-memory.dmp

      Filesize

      16KB

    • memory/376-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/376-3-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/376-4-0x0000000002010000-0x0000000002014000-memory.dmp

      Filesize

      16KB