Analysis

  • max time kernel
    150s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 12:06

General

  • Target

    29f72f4dcf90bbed3760f744cf8168a2_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    29f72f4dcf90bbed3760f744cf8168a2

  • SHA1

    5f8109f0a2d90a6b0a958bea57e007a9664d1307

  • SHA256

    d011a9afed467505da21033b83989a087c7b4e31f396d5c400a1b86c6b5a6854

  • SHA512

    d84b00c37a14f0c45e6edb664a35f324e2add40596762f3c3733ab77df40504f4295e76774b0af8c2992802564ccc0f237753837fce710c713afb076450fd341

  • SSDEEP

    768:SU77Rbfnh9Ye4tboIYrKiM/9vLmxDkoaWynn/weeinGfHum+cx0hw59p/VVOP1bS:SU7zye4t8uiMExZMnnYyGfHuEx0kpjOs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29f72f4dcf90bbed3760f744cf8168a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29f72f4dcf90bbed3760f744cf8168a2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "
      2⤵
        PID:4068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\delself.bat

      Filesize

      230B

      MD5

      1cf0f3046f29fef4b939b09993960643

      SHA1

      25dfc7c62e07c3ddb69f59c63ec944af9f7da0d2

      SHA256

      c2f2b92c8d026f904a16fb51fec75c3b841bc1dcf32f66792055d7c956b22b2a

      SHA512

      43485f21f25cd5e4c2dd3aa8ef768c5d2687af3339f279f1b724331a0681e44ffd51d62187bde1dc13e61c158d3c01a595239c6e9113438b0e51bb6c69e997ac

    • memory/2328-0-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2328-1-0x0000000000403000-0x0000000000404000-memory.dmp

      Filesize

      4KB

    • memory/2328-2-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2328-5-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2328-11-0x0000000000403000-0x0000000000404000-memory.dmp

      Filesize

      4KB