Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 22:43

General

  • Target

    60476c892ca790e28f8aaf1f56b50518_JaffaCakes118.exe

  • Size

    692KB

  • MD5

    60476c892ca790e28f8aaf1f56b50518

  • SHA1

    157ba2fcd7f004aa0d6b2c266edab867f374cea8

  • SHA256

    c8e172c2aa134a995cf449c22fc72d552dfe82ee50562a5ae6d63fc716593104

  • SHA512

    db27ddfa7432f437ef9ba2bc80bffa84a20911f3dbf373b9a4867e809e2cf0d7f95b7b8d3765ebabe521771acb52021f942ad62f295b868951bb89d842f7550d

  • SSDEEP

    6144:mw2VnAKP8AcO/t4JRPB/Wsw7epczK7mYYVce4H8bE11VORe/mOAH6gdJmw9Sq+l6:z2j8PdxB/Ws64vmQ11Vf/mOAHXL8ll6

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60476c892ca790e28f8aaf1f56b50518_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\60476c892ca790e28f8aaf1f56b50518_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\SysWOW64\svchcst.exe
      "C:\Windows\system32\svchcst.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c regedit -s C:\Windows\reg.reg
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\SysWOW64\regedit.exe
          regedit -s C:\Windows\reg.reg
          4⤵
          • Adds Run key to start application
          • Runs .reg file with regedit
          PID:4312
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ .bat" "
      2⤵
        PID:3844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ .bat

      Filesize

      137B

      MD5

      91031b1ce91d7ebfeedba7549c7d77de

      SHA1

      2796c5e42a7a2467f8e02f17fa9812a3470a861b

      SHA256

      ebe2f95753a116102898b90dab09a7287d7d61e22e2c541e93482201c0f6c396

      SHA512

      77e04e3f6016a52a8637b7dfe5f21af99f40cab78be38e6bf01b5887827da4e6240d4f3ebac977b1190fcebb428e6e03f3b242cb69764dc9f374d58fbe756420

    • C:\Windows\SysWOW64\svchcst.exe

      Filesize

      692KB

      MD5

      60476c892ca790e28f8aaf1f56b50518

      SHA1

      157ba2fcd7f004aa0d6b2c266edab867f374cea8

      SHA256

      c8e172c2aa134a995cf449c22fc72d552dfe82ee50562a5ae6d63fc716593104

      SHA512

      db27ddfa7432f437ef9ba2bc80bffa84a20911f3dbf373b9a4867e809e2cf0d7f95b7b8d3765ebabe521771acb52021f942ad62f295b868951bb89d842f7550d

    • C:\Windows\reg.reg

      Filesize

      154B

      MD5

      d00bcc58dfddbb4cce3fd371c35651a2

      SHA1

      737b23026c9efa398127bed43aef144ad95eff45

      SHA256

      a776baa2520c61f8bfa3bf42ffc16acc896cea78af8ae0b896598bb0f075b251

      SHA512

      a01d95437b4675d79b8dbe7bb35b7dd982f7093ba979eb735ed1802a7d5c19dc2e494ef86f846767be858fec1ee3dba9f79dd962eb21fb5282290edde60d142c