Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-07-2024 03:06

General

  • Target

    2ac5b8fc80b706bf293bd75dbbbc1b7c_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    2ac5b8fc80b706bf293bd75dbbbc1b7c

  • SHA1

    e8c82aefa7fcbc3cf0abd5d988c4547bd9a8b2b2

  • SHA256

    e57bdcd2361cf37370d0c140666f2511f4a5f00160d8952f1020402f6f2c326b

  • SHA512

    7372545d58de2ffa30c11ed9e4091dea19159783c0ae744523d66081ce881e34b358d41d70a3cb32551df68608eb60c6a445aa783a32ab80dfb8c7400fc4ac1f

  • SSDEEP

    24576:yTCMXuthC1jc1a05AuLq8sQ787TcCTd0bojsPpnvZKjtSrp:yTC4uOVcY6JLq8sUHkj6pvZKQ9

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ac5b8fc80b706bf293bd75dbbbc1b7c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ac5b8fc80b706bf293bd75dbbbc1b7c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:653858 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\2ac5b8fc80b706bf293bd75dbbbc1b7c_JaffaCakes118.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-2494989678-839960665-2515455429-1000"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

    Filesize

    562KB

    MD5

    2a6851974cff57bee62a83c52ce68863

    SHA1

    c3b22bb00c555274d6413ae48e3ed82103462ff6

    SHA256

    d2e97cdb120c1a88340553db0de85b525b2f3fae163715c789dc1ba3f76b72a1

    SHA512

    25e1a733873f8ab294a281ec658c117d8c93b89ab63a73f199d9b53b25738e3f906822fd5915f360c24bcc9ad1672520e8d8e0964e06624e59750b2d176c2f5a

  • memory/2292-11-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/2292-72-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB