Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 20:44

General

  • Target

    26263185370d3950c2550a7462940e74_JaffaCakes118.exe

  • Size

    62KB

  • MD5

    26263185370d3950c2550a7462940e74

  • SHA1

    683f72e330a8b69d1360569c38b8884188bcfd68

  • SHA256

    bf25a507b3956931819dbc7a8e88554e7f1758467244c8604e3fbd3fc8de0db5

  • SHA512

    bf97809b096facf0d675260915dbdf46c618320d39727bd5d0e485a1a3555de111f93407d22de62628970a60ba12ac2f6b30fc09ff6e82c1f41c03274a9c074b

  • SSDEEP

    1536:l43X0dQhLCEQbqsKK7r7YZllMi1afYQOvi1:lT+hLCjFj/G7MnwI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26263185370d3950c2550a7462940e74_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26263185370d3950c2550a7462940e74_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uweeaorv.bat" "
      2⤵
        PID:816
      • C:\Windows\SysWOW64\logon.exe
        C:\Windows\system32\logon.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        PID:4760

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\uweeaorv.bat

            Filesize

            244B

            MD5

            7301fa0f56195db7e10a527bf39e2e9f

            SHA1

            3597cfb2596c89b9cdafa2fb28b99caee682ac29

            SHA256

            089410bcc55e9af0ce03998aff960cdc266e6b8001e08498e269b208b7a5f4f6

            SHA512

            53d436284b31b009af63aa6f65617fbbb4c3367a633100b5ffb505fb72795a534bd75edee36c03bed067c674ef553dc299ec114d5cbf834210d58466ff5eb958

          • C:\Windows\SysWOW64\logon.exe

            Filesize

            62KB

            MD5

            26263185370d3950c2550a7462940e74

            SHA1

            683f72e330a8b69d1360569c38b8884188bcfd68

            SHA256

            bf25a507b3956931819dbc7a8e88554e7f1758467244c8604e3fbd3fc8de0db5

            SHA512

            bf97809b096facf0d675260915dbdf46c618320d39727bd5d0e485a1a3555de111f93407d22de62628970a60ba12ac2f6b30fc09ff6e82c1f41c03274a9c074b

          • memory/1980-0-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/1980-1-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/1980-2-0x0000000000401000-0x0000000000421000-memory.dmp

            Filesize

            128KB

          • memory/1980-15-0x0000000000401000-0x0000000000421000-memory.dmp

            Filesize

            128KB

          • memory/1980-14-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/4760-16-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/4760-17-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/4760-19-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/4760-25-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB