Analysis

  • max time kernel
    136s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 23:55

General

  • Target

    65547d7287008fffe772a55286394a61_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    65547d7287008fffe772a55286394a61

  • SHA1

    4992f0d5bed46a4a12978b4367cec6d684871ea3

  • SHA256

    1cbd48613b378e69b8e6dd2f8d05fd2b56f5a7fe7e877f7d615f8fda5d6d9dbb

  • SHA512

    076fab0fadf1f5c0bdec9c3ff41f7d10eb66b34f0531e65f3d953236d9f4e02805d19e5ea21d26004bdb5364c50c7338ab8bae86ae4c2b72ab40f2f2f60a0f70

  • SSDEEP

    384:hCPD+fI6+SvH/ZaRvSASPRnv7Xy1ROYP+jUbFXeIJFt3kCzrD1Eux7yJIcR:g27pfZovWPt7ivOYWjonUC996

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65547d7287008fffe772a55286394a61_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65547d7287008fffe772a55286394a61_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\comdlg32.exe
      "C:\Users\Admin\comdlg32.exe"
      2⤵
      • Executes dropped EXE
      PID:1572
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 616
        3⤵
        • Program crash
        PID:544
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1572 -ip 1572
    1⤵
      PID:2464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\comdlg32.exe

      Filesize

      42KB

      MD5

      65547d7287008fffe772a55286394a61

      SHA1

      4992f0d5bed46a4a12978b4367cec6d684871ea3

      SHA256

      1cbd48613b378e69b8e6dd2f8d05fd2b56f5a7fe7e877f7d615f8fda5d6d9dbb

      SHA512

      076fab0fadf1f5c0bdec9c3ff41f7d10eb66b34f0531e65f3d953236d9f4e02805d19e5ea21d26004bdb5364c50c7338ab8bae86ae4c2b72ab40f2f2f60a0f70

    • memory/1572-75-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1572-78-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2892-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2892-77-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB