Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 06:33

General

  • Target

    1921a3114016c24e2c1a60e0f67ec6a6_JaffaCakes118.exe

  • Size

    69KB

  • MD5

    1921a3114016c24e2c1a60e0f67ec6a6

  • SHA1

    847ba7220d4b875bb175e97158981fb227867288

  • SHA256

    87968b697184a6ec67f509a53307d16dc4128d7693a2298279a0e682460e98b9

  • SHA512

    8a00fd7da87db330e34bd432d8f2a1ae71fe4c8e7e87424f4e5d2951210e95eadb53ec04ff215430c4adf6c35b3631f675a30f592549907f7b7bf9669f8206a7

  • SSDEEP

    1536:Bn7fPC3PgIJnya9O/w8gSRNurlsnSaC7jiUI2Od5nwb7rqR:F3C3Ppya9OLNurmnRCKUI2YmK

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1921a3114016c24e2c1a60e0f67ec6a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1921a3114016c24e2c1a60e0f67ec6a6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Wrf..bat" > nul 2> nul
      2⤵
        PID:676
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2424

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Wrf..bat

        Filesize

        238B

        MD5

        296a8b63e62267437ebc2f62f556c3a7

        SHA1

        947db92ec5ea48fa02f32f097d4807d4b1f939ea

        SHA256

        c2abe86f0431e6e01e9dc9ec9908026abaceaa4214be5a5edf0bb3e3c439f025

        SHA512

        827ea4397e12567b75e2f0f9e183d83663166e54f7c5616da06068512554cee1fda086a5ab422fa7bbbafe3d236da31b884b8b9af1826a28e60ae2dba29f2e8f

      • memory/4504-0-0x0000000000580000-0x000000000059C000-memory.dmp

        Filesize

        112KB

      • memory/4504-1-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/4504-2-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/4504-4-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB