Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 01:24

General

  • Target

    3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe

  • Size

    77KB

  • MD5

    3b7bc7f492cfd473ec461c8b455357de

  • SHA1

    98bb125be79e458465d3a5ea356d3e9aaff1e636

  • SHA256

    ec82bee3e40e707878d0c7618b864a7276cce64ff2783e9a7118fdf3700c1d53

  • SHA512

    f606c7b1659cfa0fa8ce213c1da36be9cad8a788fdaf84b475b9592fbc85df129977418b07e382d3c3877dc6c7293833c91b544cdfcf51bdc77647e56435bb96

  • SSDEEP

    1536:BRTi+Bwyj+ElS9DanycPgfT72aj53/KCY3L3RiAfLiZaK+Q:Ti0wE+El8DMdPgf1N3/VefLib

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\windows\SysWOW64\net.exe
      "C:\windows\system32\net.exe" stop wscsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
          PID:4148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 1112
        2⤵
        • Program crash
        PID:1200
      • C:\Users\Admin\AppData\Local\Temp\wmplayer.exe
        "C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"
        2⤵
        • Executes dropped EXE
        PID:904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 220
          3⤵
          • Program crash
          PID:3812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3580 -ip 3580
      1⤵
        PID:4572
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 904 -ip 904
        1⤵
          PID:4356

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\wmplayer.exe

          Filesize

          46KB

          MD5

          c63a0a6d0379b60480c0e69f2647e97e

          SHA1

          ec4d1e2d97ff5e062f614af611265a471e05b167

          SHA256

          5a07b07b5c9d87db4e4340035b7315e52d9e9b7114662acb02d38f70f32067fd

          SHA512

          be0d154fa7b3e9e967a6b593bcb41be4457d976b1f375289f9fa99d2f0dc9e45e82a1a542ba798edaab6b47ae0c5f61553942071a0753f6990e698cb3597e961

        • memory/904-8-0x0000000013140000-0x0000000013189000-memory.dmp

          Filesize

          292KB