Analysis

  • max time kernel
    125s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 11:40

General

  • Target

    2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    2c32f844e0cd375070e06bb9e0e215da

  • SHA1

    20e1f35297d62e3cdc6ebbf8788649eed1854655

  • SHA256

    93278a2db71873c7503dd0986c31c4b41d7ff649ef8cd07986278595e5e65933

  • SHA512

    1265345ca01a7cdb5ae2de6ee3589feebf22967af0e25281a10222f8429fa507f667e5d4998d6173201c90bbf72713af673becb712b6f405c90f961954416a17

  • SSDEEP

    192:f83msQ4B1Z8F274/JQtCBdH0dHRdHwdHPH1SdHK18G+j5P:f+mcB1Z8jxQtCBqrmuw+B

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Event Triggered Execution: Image File Execution Options Injection
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\LSPRN.EXE
      "C:\Windows\LSPRN.EXE"
      2⤵
      • Adds policy Run key to start application
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:3124
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1340,i,4018838247141480194,10874272319406041522,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:8
    1⤵
      PID:3304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\LSPRN.EXE

      Filesize

      16KB

      MD5

      2c32f844e0cd375070e06bb9e0e215da

      SHA1

      20e1f35297d62e3cdc6ebbf8788649eed1854655

      SHA256

      93278a2db71873c7503dd0986c31c4b41d7ff649ef8cd07986278595e5e65933

      SHA512

      1265345ca01a7cdb5ae2de6ee3589feebf22967af0e25281a10222f8429fa507f667e5d4998d6173201c90bbf72713af673becb712b6f405c90f961954416a17