Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 05:21

General

  • Target

    37d967d2499d538f6fe5f9980a4b2242_JaffaCakes118.exe

  • Size

    494KB

  • MD5

    37d967d2499d538f6fe5f9980a4b2242

  • SHA1

    c0672450b4888eb05b4a058a5397e97d74f59433

  • SHA256

    f2e6283084529baeedd48ee8a6f419c738867d897c0cc8ae1f6e8f33a288314c

  • SHA512

    ecbb74474ca39a254de49f3bae6214bc64688bc662d85475614fbed16e555dfca940ee2ecd1478207054312dab7140f6b4dc0add9015efbb107a683477599664

  • SSDEEP

    12288:340IN8sAahDijGgkTj9IfMM9cwymfByHvNRrEr0mV:340M1RjCRcxrs0mV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37d967d2499d538f6fe5f9980a4b2242_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\37d967d2499d538f6fe5f9980a4b2242_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      PID:3544
    • C:\Users\Admin\AppData\Local\Temp\killme.exe
      "C:\Users\Admin\AppData\Local\Temp\killme.exe"
      2⤵
      • Executes dropped EXE
      PID:4688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\37d967d2499d538f6fe5f9980a4b2242_JaffaCakes118.exe" >> NUL
      2⤵
        PID:5044
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x508 0x414
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\killme.exe

      Filesize

      476KB

      MD5

      9271d8f31b18689799c4499394b63c69

      SHA1

      21d239dace51f0d6236fbe5493949ee2ab973523

      SHA256

      e8b97164dfee588e100c9dc356be94156c661911482c88a6b564775d8799ae4d

      SHA512

      74e8b3ac50857e499cd07be4aadfc587d3121bf2a5f4f8341c29935d1b5fde069f0eff1a87d415dcceb1426d798700e1282415647387747ceb7bcbacfd5dbcb8

    • C:\Users\Admin\AppData\Local\Temp\tmp.exe

      Filesize

      7KB

      MD5

      368eefbfdad57d6d3727fbf2115534a2

      SHA1

      5b5126ffeaaaf54e9e5e201118c1b18748ca9589

      SHA256

      91b55c274249ff091ac704eefcd08ab3bab83d9c950d80d221751593ea2387c4

      SHA512

      4663548759d1b8ea91d8e99c3bde482121f87d49ff0772c2fc445fbfc5d4a3e68a80f333bb08efc059cd7a7ec26c9f483d2d8fdab1964682e32e4baa5a80f5ca

    • memory/3544-22-0x0000000072DDE000-0x0000000072DDF000-memory.dmp

      Filesize

      4KB

    • memory/3544-26-0x0000000000EB0000-0x0000000000EB8000-memory.dmp

      Filesize

      32KB

    • memory/3544-27-0x0000000005D50000-0x00000000062F4000-memory.dmp

      Filesize

      5.6MB

    • memory/3544-28-0x0000000005890000-0x0000000005922000-memory.dmp

      Filesize

      584KB

    • memory/3544-29-0x0000000005950000-0x000000000595A000-memory.dmp

      Filesize

      40KB

    • memory/3544-30-0x0000000072DD0000-0x0000000073580000-memory.dmp

      Filesize

      7.7MB

    • memory/3544-31-0x0000000072DD0000-0x0000000073580000-memory.dmp

      Filesize

      7.7MB

    • memory/4688-18-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/4688-20-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/4688-19-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB