Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 01:33

General

  • Target

    2a849e4847cc2616b247ddda8146e71b_JaffaCakes118.exe

  • Size

    22KB

  • MD5

    2a849e4847cc2616b247ddda8146e71b

  • SHA1

    41bc410d7d7b5514bc076d54deecf0da1c85149e

  • SHA256

    8dbbc5bc52c4a47af1dbb096d5831c5c33db9a338681b82e9d7ec0791a65c5e6

  • SHA512

    2a2ad54a40a0dbc18112a1cb9767bdda08118c13f64a6d1c7f5e9c4b403bcef0a908bda30ac3e51421bac917972fa4d8917826b4751f50600dbea5c832177366

  • SSDEEP

    384:Hyf/2JBtpl0RWS4mWpQCCZWaj35tdm2A7tZ0pyN1XWoIbIrkvtmJLme:Hy2J/8mhqZ7j1c7jog1e

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a849e4847cc2616b247ddda8146e71b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a849e4847cc2616b247ddda8146e71b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2A849E~1.EXE > nul
      2⤵
        PID:4924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\vjqyoqlc.exe

      Filesize

      17B

      MD5

      eeb13468b73d93fa8bcbe3ebae6df720

      SHA1

      1f55c90d5ce61c6447e923443d496b137be35c63

      SHA256

      802600d124464157037a2519acb3cff90b97670fd04809ea902fbb95497a12ca

      SHA512

      28d8aa5b08384343fb21f594e413b99ae2f6fb5945345dd4e1af278e24dbc5ad3e8cbebfce889d397830f3fc287a4cd4728897f3aa97129558c72fd3ece23e05

    • memory/2684-0-0x0000000000560000-0x0000000000565000-memory.dmp

      Filesize

      20KB

    • memory/2684-1-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2684-32-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB