Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 08:54

General

  • Target

    2fb972de7b312d54179a9c41837519dd_JaffaCakes118.exe

  • Size

    380KB

  • MD5

    2fb972de7b312d54179a9c41837519dd

  • SHA1

    92927b9d4161872044d7b5741e3742402ceba357

  • SHA256

    58dcef07f7b56c31309ff2e828ddd0fdc90e7ec3a82e4b2a20e4205bae8637d5

  • SHA512

    104bc5019484778137fc7e6f82836e223a6016cf6d670ca66dc3e5006df4dd1996baa2a29d4b4ead447b8534f1c37566d2c0b0c13a47c3c8280053b08289b73e

  • SSDEEP

    6144:DyP/HiDMuQeNzrPoB5vmMnv4sxtPJGz04Dv0wppCzkF/wVNxGcb:OiDbRNzjo7bnv4cJGz0K1QkNaNsK

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fb972de7b312d54179a9c41837519dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2fb972de7b312d54179a9c41837519dd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "
      2⤵
        PID:3760

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_uninsep.bat

            Filesize

            262B

            MD5

            127ccdea5b46c2485c4b716fa1d06ebf

            SHA1

            74e54f61fa201f93b7756db27c86571e608e5280

            SHA256

            9bad7dc904202422a138ac5386c9111faba62b883f4d152e6af4039a24fe3b0b

            SHA512

            dee5bfcf2f8028d80419389f82680ab432a4af10d7f1c85524f4fa5eaf05300dedfa110efb1de774e20dcccb27ed2d3d5aa54ded58d93cde949f0d5c4f6ee35a

          • memory/3608-0-0x0000000000400000-0x000000000045F000-memory.dmp

            Filesize

            380KB

          • memory/3608-4-0x0000000000400000-0x000000000045F000-memory.dmp

            Filesize

            380KB