Analysis

  • max time kernel
    94s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 02:33

General

  • Target

    2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe

  • Size

    8KB

  • MD5

    2aae317c75f9b4b591d44731924cdd57

  • SHA1

    bd15068f86167d5380d4e19661350c14f608c55f

  • SHA256

    3551f815794b10ca11146b4cd1b40a8a5fdb910d6d81027b7bd10dc9f3076e36

  • SHA512

    2d3b3cfa2698a134f7bba01bb4b4d2d4cc176941780fdcbc2867e5cf7abae50af47973e7e12ee5bb822388bf3b0bafaea456dac7b59ab42e287cbdd77b1dea73

  • SSDEEP

    192:Q4D8/ZNI/0J+OSdFnz4/QoC4ZFaNJhLkwcud2DH9VwGfctlHO:vtOkFnz8RCUaNJawcudoD7UC

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B5C3.tmp\batfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo. "
          4⤵
            PID:4388
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" date "
            4⤵
              PID:4992
            • C:\Windows\SysWOW64\find.exe
              find /c /i "2008-10"
              4⤵
                PID:3296
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "
              3⤵
                PID:5028

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe

            Filesize

            8KB

            MD5

            8f7ccf720e03d40de2dd0e1eff5860b6

            SHA1

            d1edcf27974bbf1f762d05224e5ab1ec03fab15a

            SHA256

            f4ac93bee578357364befef47856b66dfcfb9c305d94831f7b2b56db69a27825

            SHA512

            c6f970355313db7cff5d7e493ee66566e543707284a39328305c73bb432a37cf43121f1b0c841137668afdb05e8fa9e1b4b889ee49472c927d4a20d1520b4b13

          • C:\Users\Admin\AppData\Local\Temp\B5C3.tmp\batfile.bat

            Filesize

            142B

            MD5

            d0dbb92c87f1a92088e774546ead3706

            SHA1

            391e113539fe3f892ca57906b008a6fca4d45188

            SHA256

            71d0eff6f46c585792e10851648c0fbe0b0e0702ae6e90964eb0eb25af3bd96e

            SHA512

            f2bc16895f0d7b576f6c43718f98200000270e3bb265b6ab3796d8149701ab5c95bd73dc5266ee63719b8bd2fae2d3faeaa414dd802cde0902027143ab6d441d

          • C:\Users\Admin\AppData\Local\Temp\selfdel0.bat

            Filesize

            158B

            MD5

            5e8b3b1044f30c6d15415d53cd83be5d

            SHA1

            de92057230132122b5ef87b8796671e1f01471b4

            SHA256

            a3b28c3df5f20e0d4cc789d5e62828309517d2faf3c684a0ea3c7739f900db46

            SHA512

            5999c8b32fe203a397e9994efbc17c8b3c4f9fa7664380a3983f1a1486ddfc525df0331261b8e08bb7ca42e6f93c206627aa0de1a8fe0aee68d557cba6c5ed99

          • memory/948-8-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/948-18-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2432-0-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2432-9-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB