Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 03:09

General

  • Target

    2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    2eca7340fea1097fc793af9fa4283ef7

  • SHA1

    6194fc1424d14c934626c7c5e461c11617c3e6fd

  • SHA256

    f9fccf384c8b213e23923f24d673a1a9180fad6344aabd95263013980031283a

  • SHA512

    82b0229fff1f9035fcd990e264d1da1568797582137b3446bf97fd2fd8c364de0039b83dc3066cc0c5625e8cc34631d68187f91bd6e4932278f11d239b3a3020

  • SSDEEP

    24576:u8lts9l/1e4CqxbpyaYwkkUyhgrIihU4BuhYCLEW2vxZlxlH:uqG9pk5qxtSBr/hU4BwOFH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files (x86)\duoduo\arun.exe
      "C:\Program Files (x86)\duoduo\arun.exe"
      2⤵
      • Executes dropped EXE
      PID:944
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3872,i,5095735526234624271,6356691058050835509,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:8
    1⤵
      PID:4024

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\duoduo\arun.exe

            Filesize

            36KB

            MD5

            a78ea1aaa98d2aa7662ceaee47a60f52

            SHA1

            66e4987ddcc66aef31e6b676b3c7dbcba1ab24d3

            SHA256

            7c255a05e81fe66e199297bd711059a9500eb4b70aabebcfc1526dd8438f7484

            SHA512

            5227e16bd84f363533cf205661f6a165fc65b62c515f158911924da06a67488a371f03f8f701d293343a546527613d62636b98c1e35bcc3bc7c2d55d209d2e62

          • C:\Program Files (x86)\duoduo\ff.exe

            Filesize

            48KB

            MD5

            ba6edc95f02a099a65eebcad56f36375

            SHA1

            20affafd610f1f410604a01435657675f7528987

            SHA256

            14a29286943f5ed955d65b3bbaf9d9411b2e7053b33eb901043f4178058a4909

            SHA512

            e3d4427e8083e28856143a25aac547c6473e9176717a30cc1d01a91f897df5fd1c5e4c70d5c82df52b23aff1252667b198881bcfd94517ba6c99deb7fe689e04

          • memory/2420-41-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB