Analysis

  • max time kernel
    127s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 02:40

General

  • Target

    3fde0debbd8dc4fba1a506a1bd6be012_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    3fde0debbd8dc4fba1a506a1bd6be012

  • SHA1

    ddcae4f4f942b509a1993ffdbf86caaeeabecc6d

  • SHA256

    dbc1875e6e0b11e526b34f2e00341c072a294615c46e76a1bb0fc755b81fc9f8

  • SHA512

    38407ba3b2ae2de1b2c6759fca66e9548a42176ea7dd0499e30989d63cbf267489b3b2ae355100d2ab2fe2b837db498d9ec55232ca9464fb2d8029b308674242

  • SSDEEP

    1536:EvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjVSrow3K:EvVQLIkLWeaA8KlCph9crow3K

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fde0debbd8dc4fba1a506a1bd6be012_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3fde0debbd8dc4fba1a506a1bd6be012_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Program Files (x86)\48ddfb2\jusched.exe
      "C:\Program Files (x86)\48ddfb2\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\48ddfb2\48ddfb2

          Filesize

          17B

          MD5

          7bdf61d37c9adf3e1c6937107016091f

          SHA1

          56b8e0c454f9dd16d508a04b3afa7e458453ac41

          SHA256

          4c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0

          SHA512

          ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1

        • C:\Program Files (x86)\48ddfb2\jusched.exe

          Filesize

          188KB

          MD5

          87c328effa17195ed57794deab98a33f

          SHA1

          b097af849a56d0ac59e43ec2ef5e9c3211b7ccab

          SHA256

          1b185065a0146943bdb817486f1ce031cff08f7c0e8c101080e232f235f5543c

          SHA512

          23c264b38cf64705c14b26d94f5f09ee4f63d6ce0d63ae0072e43e4d831082c6b376928c394510a98ded72cc5b952db124a90cc0b5302c411e8ad11133d165fe