Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 01:07

General

  • Target

    3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    3f983f434ea7ffb7848e46b9cb923d1d

  • SHA1

    6a032ea5adf8afa7e247730b35d30d0ebd6f7772

  • SHA256

    5ac7cbe150ef2257ae0ade9d5c248b7b32d62f734dfaf6e334659180661398e3

  • SHA512

    421a5a3a9dd318915ae7db0309412f5a6646c24980eac5dfc44f7c0b0cc09daf47d6dfec64f7b94f2bf13b429857e3bd2c3ffc3d7365c0b765005b8ed5e29a0e

  • SSDEEP

    49152:2KyNuJRerrlMLj87/KKoiTavyqBvMjE8rwhg:2KyNuKf53RayE8rwi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\filesystemscan.exe
      "C:\Users\Admin\AppData\Local\Temp\filesystemscan.exe"
      2⤵
      • Executes dropped EXE
      PID:3624
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
      2⤵
        PID:4480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

      Filesize

      264B

      MD5

      326b94940f7de63ae804542475bcdaf8

      SHA1

      1bf6365703fea037801cbc094fffbd3bb2b6f3c5

      SHA256

      bc0fd2f193663646997b72924944faf77bdceedd0701aed2812c680528c6907f

      SHA512

      e7557339ab8053914900f2ead62af6adf1c93749128e851e9fc06824f069ab257c916c15a8ca12301eb9e0e9362a71bfad85887b771bc0f7294c4774bac99b71

    • C:\Users\Admin\AppData\Local\Temp\filesystemscan.exe

      Filesize

      2.2MB

      MD5

      0f67b7094ff20b957f57bf25b356a4bf

      SHA1

      20d4155e0b67f0f7c86603b3c3723b65d3d284ba

      SHA256

      a85ba09841ba07704c7ba2f5dd6d05e002e57d20a15ec7ec06b6991ce97eaa64

      SHA512

      0ae4a152fdf502aa24805ae2565c96524ab6228bbc8ec35fb529bf05bd9498442f22c1527a00e72cae8260726a09d330a9a691eb7d138b4bf442a268b7b2dfb7

    • memory/3624-12-0x0000000000400000-0x00000000009B9000-memory.dmp

      Filesize

      5.7MB