Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 04:51

General

  • Target

    24b027ff78be2e6409342b6c60e07f6e_JaffaCakes118.exe

  • Size

    473KB

  • MD5

    24b027ff78be2e6409342b6c60e07f6e

  • SHA1

    ab5ec63f9ed90185ea2aa27bc6c077c88549daf5

  • SHA256

    1a0c3cfb66d8dc190cc20b32700819efe4dc4700c53c2b5c8640132e847b76bd

  • SHA512

    86032513e7b4cc5ccf3f7b84085807587c5f59235c707a4fc981ff6d472b326840ce66ad20b10824927b5e9da263f4e6004dbd07ef1af2a1fe33f0271b6af188

  • SSDEEP

    12288:bXabaKHML5h0cp3+iJjqw4/nL2Ir2H7pETk:LiS7/p3+ioJPiQiET

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24b027ff78be2e6409342b6c60e07f6e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\24b027ff78be2e6409342b6c60e07f6e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\WED.exe
      "C:\Users\Admin\AppData\Local\Temp\WED.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:3236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c deleteself.bat
      2⤵
        PID:4560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\WED.exe

      Filesize

      473KB

      MD5

      24b027ff78be2e6409342b6c60e07f6e

      SHA1

      ab5ec63f9ed90185ea2aa27bc6c077c88549daf5

      SHA256

      1a0c3cfb66d8dc190cc20b32700819efe4dc4700c53c2b5c8640132e847b76bd

      SHA512

      86032513e7b4cc5ccf3f7b84085807587c5f59235c707a4fc981ff6d472b326840ce66ad20b10824927b5e9da263f4e6004dbd07ef1af2a1fe33f0271b6af188

    • C:\Users\Admin\AppData\Local\Temp\deleteself.bat

      Filesize

      226B

      MD5

      3ecb1ff6ff93d28d6a745e60af8acc2a

      SHA1

      d997e31fc6db111fba3a7598010984e833d87815

      SHA256

      f932ee6f0c5dfadaec4d28ae47f1fdddf2e2f1f181f914b5498175d28a6eb3fd

      SHA512

      0336fa19d88ce7a4165adda982b40119e26cb21a57d73978690ee38d45bdd7164f302231012d070900fe232ab8907142373d17e2d1dbf627a258b706498d8d87

    • memory/2368-16-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/2368-0-0x0000000002210000-0x0000000002211000-memory.dmp

      Filesize

      4KB

    • memory/3236-21-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-17-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-18-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-19-0x0000000000570000-0x0000000000571000-memory.dmp

      Filesize

      4KB

    • memory/3236-14-0x0000000000570000-0x0000000000571000-memory.dmp

      Filesize

      4KB

    • memory/3236-22-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-23-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-24-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-26-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-28-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-29-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/3236-30-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB