Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 10:13

General

  • Target

    25901ed5ec46cae8854f7d38a053d506_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    25901ed5ec46cae8854f7d38a053d506

  • SHA1

    7d9e1dd32a5cea4f1866c592e34263288f0a305f

  • SHA256

    40132aaab6e5318d86b48125655dc5f6818492bb57748157997a980cd1d74663

  • SHA512

    831db407a4ff0844dfd7981bfae893a3683496955f1b2da73e3bd02b7b4c77b6f726ca19f983f92b4ce3adcc529713153885d3c7cd6b209a2c2669b352f349c5

  • SSDEEP

    1536:2wLD8sK0m3aHUMwLZmJv21klsWfzpEabt1SziPHFAZ4w:2wjmK0lZmJvblhOmzful

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25901ed5ec46cae8854f7d38a053d506_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25901ed5ec46cae8854f7d38a053d506_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Users\Admin\AppData\Local\Temp\nsj37CB.tmp\autorun.exe
      "C:\Users\Admin\AppData\Local\Temp\nsj37CB.tmp\autorun.exe"
      2⤵
      • Executes dropped EXE
      PID:2764
    • C:\Users\Admin\AppData\Local\Temp\nsj37CB.tmp\ic1.exe
      "C:\Users\Admin\AppData\Local\Temp\nsj37CB.tmp\ic1.exe"
      2⤵
      • Executes dropped EXE
      PID:4316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsj37CB.tmp\autorun.exe

    Filesize

    42KB

    MD5

    fff67b4105ccf589c4c58e9341f97896

    SHA1

    2a04aa9fed66d6b4089685ead2ceeac1c1fa43d2

    SHA256

    8724f060abfe67601450ea4c7ff753d5eff957e7fff3ec3f180b6540aa6e19e1

    SHA512

    0282d11eb7b08afe9a5e3f4b61dbd9f7b776905bbe471b20c8c0c39f15ab2193b28a59fce42071e97eaabbee4ebf5d7c8ac1e44b646311efe54f9f7fa751fae5

  • C:\Users\Admin\AppData\Local\Temp\nsj37CB.tmp\ic1.exe

    Filesize

    18KB

    MD5

    b64b538899d4588a05d7d3db92918448

    SHA1

    b2d0b29a9c69bac6b22f696474eb031cca664f9a

    SHA256

    803abec016d53636f2817c972f2c769beb36501fc8bd30c73994958eb94cfb29

    SHA512

    ba4732c7a25dfdd636009a5ec8597e233c7c2b736b9c08a07dce13de70d9e0e08652b7f323ab590a29b57da12bf6a347675b2103bdfef06a80dbfd555ad09727

  • memory/4316-28-0x00007FF8CEAD5000-0x00007FF8CEAD6000-memory.dmp

    Filesize

    4KB

  • memory/4316-29-0x000000001BB70000-0x000000001BC16000-memory.dmp

    Filesize

    664KB

  • memory/4316-30-0x00007FF8CE820000-0x00007FF8CF1C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4316-31-0x00007FF8CE820000-0x00007FF8CF1C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4316-32-0x000000001C0F0000-0x000000001C5BE000-memory.dmp

    Filesize

    4.8MB

  • memory/4316-33-0x000000001C6C0000-0x000000001C75C000-memory.dmp

    Filesize

    624KB

  • memory/4316-34-0x0000000001570000-0x0000000001578000-memory.dmp

    Filesize

    32KB

  • memory/4316-35-0x000000001C820000-0x000000001C86C000-memory.dmp

    Filesize

    304KB

  • memory/4316-36-0x000000001C8D0000-0x000000001C930000-memory.dmp

    Filesize

    384KB

  • memory/4316-40-0x00007FF8CEAD5000-0x00007FF8CEAD6000-memory.dmp

    Filesize

    4KB

  • memory/4316-41-0x00007FF8CE820000-0x00007FF8CF1C1000-memory.dmp

    Filesize

    9.6MB