Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 03:07

General

  • Target

    246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe

  • Size

    259KB

  • MD5

    246bdad54992a89c58ea6bb32fa92fac

  • SHA1

    3453a29d9f9aeab2501c88aad2d625f7a5bbdfe8

  • SHA256

    cd1d284ab167ca328058d9516ac452eb4a90ee7fa6aae7e511b3925e2bd8be9f

  • SHA512

    01de3566cb44864c1a8d76bfd17575d152f2557153dbc139d1061459de45a50cb9c6bdc06ea68aec0284efe1aa86173bced3f5992d88367fa6c148e003b04e85

  • SSDEEP

    6144:TamhEC+qTBgR5LEiVa5CF2zWOJtmCjgQNBuepW:n+qTe3LEP0wJt58QNBvo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Users\Admin\AppData\Local\Temp\AIR4B32.tmp\Install Penguin Families.exe
      "C:\Users\Admin\AppData\Local\Temp\AIR4B32.tmp\Install Penguin Families.exe"
      2⤵
      • Executes dropped EXE
      PID:4216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AIR4B32.tmp\.launch

    Filesize

    28B

    MD5

    d8e4d6a9659681f1fec17f44dd03f176

    SHA1

    abb094d6d8393e32987ec4bdf2c98034ad01017b

    SHA256

    dc06a0581b426dec32ca170821e13ad490fe276133996219b5a3cfa1a9d51fe5

    SHA512

    ce131a71d353e81e1ab4684f992db60cb2d99d2617997b70b0b6f9cf8d996a3a24e24bb055b3893a196b6e69bbcc7419cbd9cc179e321d1e9aade4e46eaf81bc

  • C:\Users\Admin\AppData\Local\Temp\AIR4B32.tmp\Install Penguin Families.exe

    Filesize

    127KB

    MD5

    c40bfd1e61ec7386006e4e0556e6bc7a

    SHA1

    ea86df302610ce2f720693b3d196f892aca34840

    SHA256

    10a8928c79fb0a1bc456d9ce548bf3fba3cbd67351894a0fb0ffcd1686eaec85

    SHA512

    013484737339f590d4fbb878c36883749a3160552c1cf851db6cbd3463d2e6965bc660588f33e51fba5610ef3ca5df89c879fbb53dcbd956cdab4fc8eef2ad6a