Analysis

  • max time kernel
    94s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 20:26

General

  • Target

    2db0f5dadacef12f41e0f78af130dbeb_JaffaCakes118.exe

  • Size

    23KB

  • MD5

    2db0f5dadacef12f41e0f78af130dbeb

  • SHA1

    aba789f1e20b24192b6075e3ad7114443770fe25

  • SHA256

    aa6e66f600099b333981bfe959e4d898990ad7c7a2a94760e7e3f3fd589615d5

  • SHA512

    695052ab8cb990450a4396f60389052f2f57acd0bb2bf78a37941b346cb5f6dd849c12231379e1cd203ffaedc229ae0f07707bfee2a148d9c9593dbfddbdabde

  • SSDEEP

    384:H9yU2FLIleaB62RfnahgR2CjjRmD7TwPfu6AxOi59SXI8CjnH4nyI9Bo:gUW4A2paUQ8Cjuxo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2db0f5dadacef12f41e0f78af130dbeb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2db0f5dadacef12f41e0f78af130dbeb_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\WINDOWS\Server.exe
      "C:\WINDOWS\Server.exe" "C:\Users\Admin\AppData\Local\Temp\2db0f5dadacef12f41e0f78af130dbeb_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      PID:3640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Server.exe

    Filesize

    23KB

    MD5

    2db0f5dadacef12f41e0f78af130dbeb

    SHA1

    aba789f1e20b24192b6075e3ad7114443770fe25

    SHA256

    aa6e66f600099b333981bfe959e4d898990ad7c7a2a94760e7e3f3fd589615d5

    SHA512

    695052ab8cb990450a4396f60389052f2f57acd0bb2bf78a37941b346cb5f6dd849c12231379e1cd203ffaedc229ae0f07707bfee2a148d9c9593dbfddbdabde

  • memory/1772-9-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3640-8-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB