Analysis

  • max time kernel
    93s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 17:10

General

  • Target

    4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe

  • Size

    547KB

  • MD5

    4298ca87055d12bac2e27723962997c6

  • SHA1

    ca9a61b64e480f342a41c2ed39e70541ff0a5b24

  • SHA256

    85f74e82a9804b8686169c13c6ef7ffef014f6cd156cd98a13851fe05c3fbc7b

  • SHA512

    aa118d914adae972941c2066bbdafcdb5c08a7d7adf2ca1bec13fabac6653d2dc58a764f8a517ddbfa0da420f12bb5bb1fbe5e5ae87f5d0fd7eaa5a704979ee2

  • SSDEEP

    6144:+8fd93ZBZMbqYgomHkMhEXeyp3PjroT2ORzuZ8MK5wWhxpH+2chSaeXfnCH:+cr3ZBIRxey3Pjg2k45KiWjkVFMCH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\Set7D4E.tmp
      "C:\Users\Admin\AppData\Local\Temp\Set7D4E.tmp"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Set7D4E.tmp

    Filesize

    499KB

    MD5

    23b5f1d13ac22e8579b4ae56e3417111

    SHA1

    52092550102bf18ebd7ea37d1b687d9842e34feb

    SHA256

    72a0138ed9c11a07826a955fdeaa2ca6cce324819c76a200196f00ac144ddb1d

    SHA512

    e578bf90faef4ceb451a2e0706790c6cfe552be9df502a3d7d527b5b825d618e29408d2f155fe168f80141857ab77162ce94e28f078126b6c6721492e4944143

  • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\Background.bmp

    Filesize

    25KB

    MD5

    c24d9f52dbb034a480342551ab8a5c08

    SHA1

    51a7a0ac3e9bbfe573c186225610b113942bd8bf

    SHA256

    9b369792fc959786f5b6b8aa55c0ae3e72daa597f38b29b18c54f378d22ee410

    SHA512

    c80e24b8b6fbd62fda6a79f0dc24e9c0fb53077444f08add51fb5d80b6b70c97d19bbb52358896cad5074c9e067db3fd3a14506c6c56a470c5366396d87ff288

  • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\ConfigParams.ini

    Filesize

    1KB

    MD5

    f3ac3c3da70135e5c545f14d4de896bd

    SHA1

    3cca4a3f37b681f9b72d85b5c3f613055fda0813

    SHA256

    6efab541b9374af5a33f357770f16b51d3764a375b42262738ecd3ff5aa92f83

    SHA512

    dd6df4cd3cc46f248d92a6466bd5b4d6a5467320bd598d2c414f0a2a7e756beb9a6e77e2e0a536f081b3a07b553940fc76ab7de08059f3591628559bbc2a0656

  • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\Language.ini

    Filesize

    56KB

    MD5

    5252ca1ec0ac7c5597c94ab77d3c3337

    SHA1

    9ead3438df9f5b4cf7085625d92e41e10e837820

    SHA256

    cebac778cd3c979fad52940b4c0d06b20efc09745f1652a63ca03df837119d7a

    SHA512

    aa25ed3270eef20debc14f8428e9dbaf6b32a54fd1376163771a40effa231eab33d67cd9f7a003ffd29ff3a9897cb06c4db28b1feef43114ac24e126fc582d7f

  • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\Preloader.jpg

    Filesize

    23KB

    MD5

    9e24d0b9982b61afc80a2e864e12c86f

    SHA1

    50776d36efdb0a660f5781f63a2884e53becd884

    SHA256

    f15140546b8464c59a3fa0fe8991d7132bab87465015a276c34966d995ab3020

    SHA512

    42bcb36bcffc8ce08d78fcb930da5324ac8afa10c085a7f2ff6360db87483c1ea072fd54fb94f3a44a5669245b6ba59e966a62a716f3c33b021b3e05398947f9

  • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe

    Filesize

    662KB

    MD5

    1ef40c198298e80630632e16e6a61d6c

    SHA1

    7463ec10a1f96aa3ae0356f056ccca0b2ef3618e

    SHA256

    0eec8a0fb86c6968a18044cf0cee964dae1941c19b47f1314649d3bf5278c40a

    SHA512

    3bf65a84091182d0b92c1c180e5e442462af15e264e249378adc7fe301ea8146d5329067203a679efc61f26fb8d24bcb8c432df0043a110deb8bb78e605cc9b4

  • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\zlib.dll

    Filesize

    52KB

    MD5

    4965107d112666d3835308a831a29274

    SHA1

    50439b99ce525ecb74c554e1dc43ddb39481dfa4

    SHA256

    105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af

    SHA512

    38fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59

  • memory/1420-26-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2900-29-0x0000000000A70000-0x0000000000A97000-memory.dmp

    Filesize

    156KB