Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 12:19

General

  • Target

    74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    74069a13d82ef37535b78882d1aff5ef

  • SHA1

    b66b0e7bc09370e46be4e5938881e42d004ee409

  • SHA256

    c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60

  • SHA512

    516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3

  • SSDEEP

    6144:Nu71bw8IbvtdgZ+k0ELRnuj83Q+5iGH25fIXID8dFjElHVDvo6qoS:Nu7SvLYIkve8QCiGHc1D8dEA6qoS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\WNONSM.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:368
  • C:\Windows\time.exe
    C:\Windows\time.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" 60367
      2⤵
        PID:244

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\WNONSM.bat

            Filesize

            218B

            MD5

            44ccadbb12f4d062e8de016e247e2079

            SHA1

            0655092f5b4743abc8cd1a13da0727b21fdb73b1

            SHA256

            b454617a61a5058d0212f38cdcc6ee252a360b6998ccd17702d8a369d01e749e

            SHA512

            6f827d1ebe1c7bfd7840ee47593d8a7e2a9f57fca80e339ac96d0ad4524850ee01332791561dece308f4a674d8f447a77d64a69c7a820bc1ce6b7b9d1e62852b

          • C:\Windows\time.exe

            Filesize

            298KB

            MD5

            74069a13d82ef37535b78882d1aff5ef

            SHA1

            b66b0e7bc09370e46be4e5938881e42d004ee409

            SHA256

            c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60

            SHA512

            516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3

          • memory/2248-6-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2248-7-0x0000000000940000-0x0000000000941000-memory.dmp

            Filesize

            4KB

          • memory/2248-12-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2248-14-0x0000000000940000-0x0000000000941000-memory.dmp

            Filesize

            4KB

          • memory/2248-16-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2248-20-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2248-24-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/3132-0-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/3132-1-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB

          • memory/3132-10-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB