Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 09:18

General

  • Target

    5b532b3c6e3cc47db2e9eb39291b79f0_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    5b532b3c6e3cc47db2e9eb39291b79f0

  • SHA1

    ebf4ee45f5419c5c097beeaf79018d43ea7fd91f

  • SHA256

    3b89d382d1ecc957f461df8711d9906d180fd91cbb6e040c7841d02beaa5b12e

  • SHA512

    1cfebaa7b3f69fbbeae1420b67cae64104c60326eb79ba9629a5060a971353cb9289fccd68b91b0ce14f065476dcb94bb7beb95c3d01309db1a8516fe459902f

  • SSDEEP

    768:cyb1INnTwL4FalMc0pzQRjhEzOzmR4Gco1eunjkTu8RT4sktcawfEu4jW:9ywkBc0CczOzmWoAC8y5kER

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b532b3c6e3cc47db2e9eb39291b79f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5b532b3c6e3cc47db2e9eb39291b79f0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads