Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 19:54

General

  • Target

    5d70f828c5f55e7d12adf4c6b658be2d_JaffaCakes118.exe

  • Size

    768KB

  • MD5

    5d70f828c5f55e7d12adf4c6b658be2d

  • SHA1

    d38c72914fa46d4b13b35b047bd13e248c41b09c

  • SHA256

    72af34a9415d19b9a3f6b3bd14336df08c3b419bbec5feb79396e7f1ca054aba

  • SHA512

    a461d505c8efd75deae60c29ecdb3ef4597a43f318c24c2a57f8001b99cba22b6fb829b2679c5e736bf9e23c122d6575eec4ce9d90bdd89794f63c0962fee0fe

  • SSDEEP

    12288:RTX/+0osETuOGFHQ1dLIV/EeXenMFAwtDoMKtKWX1kkH3UcNgf/J8:Z/+SOwHt/3XenaWwWX13zU/W

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d70f828c5f55e7d12adf4c6b658be2d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5d70f828c5f55e7d12adf4c6b658be2d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RockXP4_.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\RockXP4_.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RockXP4_.exe

          Filesize

          621KB

          MD5

          29ec5fdb5d057a53947254fb0615bb71

          SHA1

          de695c312dd8f967b9ad08ce983450643a34a8c9

          SHA256

          b1255771ea576264d5d6ea8239bf1a26edf63fcb9e2b8ac290d9a23ce5008338

          SHA512

          69c9a619351ec2f8ab110efa628d28c5477f611e0bec1b36f1fbe72468f142346e9b6e0b405a6fb4f5c38a67d9248e7027787a5c2cb41a014a4d92d9ecf879f1

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lang\english.xml

          Filesize

          3KB

          MD5

          05c054d0d2755e77fbda4b808c600661

          SHA1

          ed66ceab6d2254730d5b28307098e9e0b84c2531

          SHA256

          9ad47250b4d48bd3939b2ab7bb7bd72b2b9362be4e72ab8edfeed7de8551e399

          SHA512

          d95b1f665afa64e55024f5accd398d551d6c9029966f81185813bdc65d842ba54219136686c97a48d08ce0768f63586b2bcd9880f1a2653ea6d89ae02dc6a54f

        • memory/1716-48-0x0000000000400000-0x00000000005C2000-memory.dmp

          Filesize

          1.8MB

        • memory/1716-49-0x00000000007D0000-0x00000000007D1000-memory.dmp

          Filesize

          4KB

        • memory/1716-52-0x0000000000400000-0x00000000005C2000-memory.dmp

          Filesize

          1.8MB

        • memory/1716-55-0x00000000007D0000-0x00000000007D1000-memory.dmp

          Filesize

          4KB

        • memory/3960-51-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB