Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 09:40

General

  • Target

    3cdb9341aa432be8caea5c60fe862640_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    3cdb9341aa432be8caea5c60fe862640

  • SHA1

    827e9c551db01916bcae1ca39c8229ebf219d878

  • SHA256

    0ee03c7c074d5989cb758ad1ac24cc3205e02ac8a1b056febf47a682a3360240

  • SHA512

    a1d824a3001cc51c61e9bf7018d8c165c796f79a0702608bfae57f9b412b25c530bbff5583da06693639697a68cdf6083818a46a5c9f2281d3f74ae7cf5e9b59

  • SSDEEP

    384:/Tg7/UnJ/+n/EkXVfczd9PcBJ4rv2DeI:/C/2Gn3EzXPIJ4T2De

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cdb9341aa432be8caea5c60fe862640_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3cdb9341aa432be8caea5c60fe862640_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    10KB

    MD5

    bf9fac00298dd8ec4c370cc1a48485f8

    SHA1

    d8a34eab9444e396ab36bf6ff19115834564b024

    SHA256

    6985c241f042fddcc46f704e2f362886c78ec4f0ba62d26ed1d92c7fb24ca679

    SHA512

    8d9ba754dd7b72177389ac9f56505c46af4467e006d9c49e93e5c40d5eca4786248145fe9c27c8646fb96ac79d7728379bc2bc119867f9fb014b264c540f7526