Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 17:36

General

  • Target

    3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe

  • Size

    209KB

  • MD5

    3153884cd334230ae7f903658f3c53a8

  • SHA1

    30a81d50e92c5d668a3745eddfa8670f0b50dd00

  • SHA256

    ebd613a73935411e5e313bc0759192b4b803c1cdc83a82640c0549cd4da94ea4

  • SHA512

    0068e53e354ffd0f982cf17fed768cd254907feb58da1e4841d38584f2a2b2f76c55a717382c06d78f8f9a0f8699fd16187edcbed922d8935940d55fd947250b

  • SSDEEP

    3072:PGbQlkUxuTQRmHhJtG+ETFmGvbq+pCja4KQGvZYAiXu8yDKTaxl2mnMLTYAQpC3c:ePKF1vbq+cWvZ+XuZ+WsCS5ojbam

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Users\Admin\AppData\Local\Temp\3153884cd334230ae7f903658f3c53a8_JaffaCakes118.EXE
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\DiVx.exe
        "C:\Users\Admin\AppData\Local\DiVx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1220
        • C:\Users\Admin\AppData\Local\DiVx.EXE
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\DiVx.exe

    Filesize

    209KB

    MD5

    3153884cd334230ae7f903658f3c53a8

    SHA1

    30a81d50e92c5d668a3745eddfa8670f0b50dd00

    SHA256

    ebd613a73935411e5e313bc0759192b4b803c1cdc83a82640c0549cd4da94ea4

    SHA512

    0068e53e354ffd0f982cf17fed768cd254907feb58da1e4841d38584f2a2b2f76c55a717382c06d78f8f9a0f8699fd16187edcbed922d8935940d55fd947250b

  • memory/1220-67-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1220-42-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/1220-43-0x00000000024A0000-0x00000000024B0000-memory.dmp

    Filesize

    64KB

  • memory/1220-44-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/1220-47-0x0000000002900000-0x0000000002910000-memory.dmp

    Filesize

    64KB

  • memory/1220-45-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/1220-46-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/1220-49-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/1220-50-0x0000000002930000-0x0000000002940000-memory.dmp

    Filesize

    64KB

  • memory/1220-51-0x0000000002940000-0x0000000002950000-memory.dmp

    Filesize

    64KB

  • memory/1220-52-0x0000000002950000-0x0000000002960000-memory.dmp

    Filesize

    64KB

  • memory/1220-53-0x0000000002960000-0x0000000002970000-memory.dmp

    Filesize

    64KB

  • memory/1220-55-0x0000000002980000-0x0000000002990000-memory.dmp

    Filesize

    64KB

  • memory/1220-56-0x0000000002990000-0x00000000029A0000-memory.dmp

    Filesize

    64KB

  • memory/1220-57-0x00000000029A0000-0x00000000029B0000-memory.dmp

    Filesize

    64KB

  • memory/1220-54-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/1220-48-0x0000000002910000-0x0000000002920000-memory.dmp

    Filesize

    64KB

  • memory/1220-41-0x0000000000510000-0x0000000000520000-memory.dmp

    Filesize

    64KB

  • memory/1220-39-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1688-26-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1688-21-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1688-25-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1688-24-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1688-20-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1688-38-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4468-8-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/4468-15-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4468-1-0x0000000000590000-0x00000000005A0000-memory.dmp

    Filesize

    64KB

  • memory/4468-2-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/4468-10-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4468-11-0x0000000002430000-0x0000000002440000-memory.dmp

    Filesize

    64KB

  • memory/4468-5-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4468-6-0x00000000023C0000-0x00000000023D0000-memory.dmp

    Filesize

    64KB

  • memory/4468-7-0x00000000023E0000-0x00000000023F0000-memory.dmp

    Filesize

    64KB

  • memory/4468-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4468-12-0x0000000002440000-0x0000000002450000-memory.dmp

    Filesize

    64KB

  • memory/4468-13-0x0000000002450000-0x0000000002460000-memory.dmp

    Filesize

    64KB

  • memory/4468-14-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4468-23-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4468-16-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/4468-17-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4468-9-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/4468-4-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/4468-3-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/4944-65-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4944-64-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4944-66-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4944-68-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4944-69-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4944-70-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB