Analysis

  • max time kernel
    129s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 04:25

General

  • Target

    18c497f99a4188d63a19475e34c40b5b_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    18c497f99a4188d63a19475e34c40b5b

  • SHA1

    4f277d861b30da24548771b55da6d5beb3c450fa

  • SHA256

    ffcbeaf0663ff40335a47d89d6c8403ef9222d6d329af7246e90d318bfcfa632

  • SHA512

    9cbde0214c73911c0d0ddf9ea82fb5b341e8358c9701eabd30727155eac4e57c64c1c6b281772bf10198b1dd5c6cd78a989ee61026fdfe2dc4afd752139c58dc

  • SSDEEP

    1536:GxYH6A5zgA46YWGMmsGo7eRRneVttMx6Kx5sqm:THxzYWGMttVtox5C

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18c497f99a4188d63a19475e34c40b5b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\18c497f99a4188d63a19475e34c40b5b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ppv..bat" > nul 2> nul
      2⤵
        PID:3368

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Ppv..bat

            Filesize

            238B

            MD5

            613af0676b5553f8208fac693640374e

            SHA1

            9e2bb9d7019f24ab7c0a07d813e0b8bc23da96db

            SHA256

            35843c89722e93939d32b5ab3d8f52fa1786fa53a2436a54d82d7da7f26fd245

            SHA512

            e33d3548957546fbb5c80bacae4a87c17bd906fe2dcbc1e84473fc1c4d7c70de5e0d190c5b53a1b5f2677e02ba9dab4578496ca6f185696a7aa82eab4c760e97

          • memory/2760-1-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/2760-0-0x0000000000580000-0x00000000005A4000-memory.dmp

            Filesize

            144KB

          • memory/2760-3-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/2760-2-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/2760-6-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB