Analysis

  • max time kernel
    148s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 04:48

General

  • Target

    771b8e6d5c61711d62f8ea4d693a76d0_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    771b8e6d5c61711d62f8ea4d693a76d0

  • SHA1

    b0fcd7815426fdefab32e8fb9a9597b563e3c1f5

  • SHA256

    1c95226e592be7f097f657f71e659a55638bfc61cc77a5fc76dd4c55b050b7eb

  • SHA512

    2cfd146e23cf80a3d9973a3d01f44b53e8c0bcb9473fee694103443e468e0556156a723c522202cfef279f5199b9f3276b55b75f228f5120b2172abff60da775

  • SSDEEP

    12288:4r8uWVM9sCmev9C3BoADl+lbuk492hx5L4v9pynd/BYBJ3Zi:48uWmsRHxvDlZ9v9Ti

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\771b8e6d5c61711d62f8ea4d693a76d0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\771b8e6d5c61711d62f8ea4d693a76d0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Program Files\Agraszka\Zitteralnd\uohgjbnbfdsvb.exe
      "C:\Program Files\Agraszka\Zitteralnd\uohgjbnbfdsvb.exe" NULL
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Agraszka\Zitteralnd\kiyugfhgfhfgh.hfh

    Filesize

    568KB

    MD5

    d5f19359fa3312fef91d8632486446c5

    SHA1

    aa22334d73de83068bf2d4e50401111323b6c2bf

    SHA256

    c73940f2a86186b12b7f0d3806fa1be494d4d4bfe051c5a8a3e1d9e41cfe9ad5

    SHA512

    07f3ba364b0fc0696d79b5d806563733cc9d8d8dcc1fde27d278a185a282057636602037d7e89d9662c80226e9872199f588d054bef7f8a54c87e02977cd5fee

  • C:\Program Files\Agraszka\Zitteralnd\uohgjbnbfdsvb.exe

    Filesize

    572KB

    MD5

    fb4c89b568b8e4ae2824e9cca9ca67b9

    SHA1

    125d778b91d74f3e84f23c2a387d7d9668bce3f5

    SHA256

    017daef70efa90e1f6d91486487ced2aaa22f814cbc165f336e3b27738db5f22

    SHA512

    c77905cb293a6cc181f1f0bc22ed5aef4f929d60c6fe0a031f1ed3503ebc7577d2ada7da97d8528ddd41af177de5abff4c7228f19cb7143021c2290d7e815b9c

  • memory/1572-15-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB