Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 06:21

General

  • Target

    3c498763a89946cffede5ea0f2617d62_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    3c498763a89946cffede5ea0f2617d62

  • SHA1

    5466e615fa7b1c73cb5e6116792a3775d943806c

  • SHA256

    20c27c7910972a56e6033f450e32d2b76152563d26c9bd83470b190f2ae86ef2

  • SHA512

    a6a7bcf3ec4ab4f56572b348a8b596b79c5470230d6d69998533c357bf433db63fb792ef5ebf5c2d591d23fa2560435b14b4a0bba07960b6f64cc8b2497c31b9

  • SSDEEP

    768:IGtuY+8rdLFKzE4yoids6u3E9wsh4pCPR5mio1oHwXV:I1YZdLIQ4yoGs6u3E9WC5Iio1nF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c498763a89946cffede5ea0f2617d62_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c498763a89946cffede5ea0f2617d62_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\wTSuc.exe.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\wTSuc.exe.exe"
      2⤵
      • Executes dropped EXE
      PID:3856
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 252
        3⤵
        • Program crash
        PID:3208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3856 -ip 3856
    1⤵
      PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\wTSuc.exe.exe

      Filesize

      12KB

      MD5

      72bc2382cba6f480226ba4cc4aba9ab3

      SHA1

      c3fbd1cf7d93a5d30ccf2c728a0bbb453c6cd236

      SHA256

      3ea5e4088b2159326f52d36f08341887e6bb636664e5d8855016cb3bb4e0ccfb

      SHA512

      269974fcd802665e4a3505fe2bd2c48a0d9dfa8bbfd358be79d13877bbde85d2c62d19a521e4578da964dbd4460d762cbf756fb44f81036c1b58a66a6314384c

    • memory/3116-0-0x00007FF8EFFE5000-0x00007FF8EFFE6000-memory.dmp

      Filesize

      4KB

    • memory/3116-1-0x000000001BD10000-0x000000001BDB6000-memory.dmp

      Filesize

      664KB

    • memory/3116-2-0x00007FF8EFD30000-0x00007FF8F06D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3116-4-0x00007FF8EFD30000-0x00007FF8F06D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3116-14-0x00007FF8EFD30000-0x00007FF8F06D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3856-12-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3856-16-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB