Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 03:15

General

  • Target

    20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    20e60e4c8384d22886c7ba3f9923124e

  • SHA1

    00f03f24786f92d2fa313db6257c4ba386a35300

  • SHA256

    bf975b2beca4293abfa58ddfc6cb1cf3529d5e566e355d9f66291ab7854935e3

  • SHA512

    879ccb3a973c5c3c6d0748ba767481b29995d6be152789e1c16e34753e90ca1bb5638bfaf9e1cc51fff7b1be9194c89df17bcad2db53db1d5c24e2be3c8d2c2a

  • SSDEEP

    49152:qFKcGbWeufY+V4K7xGllP2thLvmEL1Dbb86XsfNDaxDXmjy:T+V4QGPPmhLvn1Dbb8HfNSXmG

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
        PID:3892
      • C:\Users\Admin\AppData\Local\KOHDBot(EU)Setup.exe
        "C:\Users\Admin\AppData\Local\KOHDBot(EU)Setup.exe"
        2⤵
        • Executes dropped EXE
        PID:5084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\KOHDBot(EU)Setup.exe

      Filesize

      1.4MB

      MD5

      e4c72afc842d275e596c9a0cb7527d9e

      SHA1

      426c336ad33765fc24b3b7769ae54297c0aeb357

      SHA256

      a4896c45c986b2cc2c68acc53af60f66db91b0aea92460d42a24b2aa358b79bd

      SHA512

      fb2b2ff0873a51dd334c782b57b9f5b3966a63b4aeb3f5dd646859f54a767be9343a6bef1d621694a08ea2e2f104f10920d96f8405d05b4fafb82934ae25be1d

    • C:\Users\Admin\AppData\Local\Temp\AITMP775\English.lng

      Filesize

      3KB

      MD5

      0ccfbdbf767e121816b59a42cfb13fe9

      SHA1

      acac1225a0110459ddc729b92c016e955dfee79d

      SHA256

      71a534e7ac8c4fbca2b2a47c7f7f7eaa3b27e88d36d17bf6035eedf767399d8f

      SHA512

      70fe25a45bd569185efe3146e411d70b5a1bfa6bc776a8cea95250b8a2bce5336d13b1ca9a2abee4a7267ab6a1f83340b9c46de2993e44b6048345f4b24ca9f7

    • C:\Users\Admin\AppData\Local\Temp\AITMP775\LEnglish.rtf

      Filesize

      9KB

      MD5

      20dfca9eb810f08615236ffcf190f775

      SHA1

      cd2454c65136378ea5e2d6b2b233560352911196

      SHA256

      2c12023733d628fd9cb42665b334a84dcb48796510babf479c2599dd9f893c80

      SHA512

      a0817e4e554f7e5d53f2380a5b02ac3d6609067089fd35750038170381abf02f66bb26922e4639c086683557d1abd14787cba7223c09b2cbf6ba125cdd487c31

    • C:\Users\Admin\AppData\Local\Temp\AITMP775\ainstaller.ini

      Filesize

      2KB

      MD5

      946281234fe17fbdb2867842e24856c9

      SHA1

      c6e09d79b1f3f64dc8dbde2cfedda8087f08c6bc

      SHA256

      ad4461fcb6f45b46be0cc1442898d243973bda481671717b63c4955ced66c567

      SHA512

      b25ca70e429fe761d171f14cf55fde290dd7e56ecebc1df8780c886f20ccd39e5a1c761a259bf9e607977cbdb5a4b468526ebd151702719852a572280ac93c62

    • memory/3160-11-0x0000000000400000-0x0000000000673000-memory.dmp

      Filesize

      2.4MB

    • memory/5084-13-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/5084-14-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/5084-91-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/5084-93-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB