Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 04:57

General

  • Target

    5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    5f1ad873fd3231f61d716fe78edbb6a8

  • SHA1

    65508849502893ea63d35935e9500d3a39da243c

  • SHA256

    7d763fc9aaf9b2ff69d99e4368409cbc323e527c8ceb9ae0d9f886c9796acd4d

  • SHA512

    a160aee8297edfe6926122cc19805aae3ec3a80a042cbcf344a2632139914b53a9401d1e0fefac95af1db60211fdff805e2dc7d5e6c3ef2100608472f3fecafe

  • SSDEEP

    768:jHSh79vmucf28z1Z2txsfa+1aLEXmjEXYEPB9sDlnxN4r9:772oKxsJ1aLEMJpZnxNU9

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe" a
      2⤵
      • Drops file in System32 directory
      PID:3052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 432
        3⤵
        • Program crash
        PID:4856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3052 -ip 3052
    1⤵
      PID:2248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/652-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/652-1-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3052-3-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3052-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3052-7-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB