Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 21:48

General

  • Target

    3f023c302786077ab8830244d707421d_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    3f023c302786077ab8830244d707421d

  • SHA1

    4e1f720d6fddba691f9182482f2b14fe3ca1bf5b

  • SHA256

    8eaa40cd898b7bb5bfd0a1592e895b57bc7645bf3f5f2fba1ba88a93811f2831

  • SHA512

    26ad641992f455c2355f533a5da95e5351e6dec4f33bb7751296b9143307ad096e1e8e28edf3599c3fa0fc135390c876a68be82819314d9c10c5116825bab6f6

  • SSDEEP

    6144:GZuuObR8sVImcyYC5KXPeRsateFk5OlZkhO:NV+mzR2CeFk6H

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f023c302786077ab8830244d707421d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f023c302786077ab8830244d707421d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe

    Filesize

    56KB

    MD5

    7faf4b532c371ffc431770bd0dd5218c

    SHA1

    0288848f1a6c782b4db2f771d2aa4104156dedad

    SHA256

    08275e35cc622e4753677969ae0cee6a5f7b4c4853595830a9bb5c7debd388b9

    SHA512

    dd91d67b393039495cb45147bc9e3ba25f967d6bce3d8f9c1a913fcf28f59e2f66752199c30289dd26a1ca7242669c2ea31c51903b294f04560256bc668d146e

  • memory/4316-14-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB