Analysis

  • max time kernel
    139s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 23:51

General

  • Target

    882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe

  • Size

    341KB

  • MD5

    882b2e7c8bb781fc77351add3e7f6e63

  • SHA1

    933bec1c429978c289657a05ab5b01e8fbbaac1a

  • SHA256

    4e3e619b80b3204cdd841a2a6dac5a17da1222ad2cb56fb6f213b3131af6e462

  • SHA512

    74a052095a06dc94b0ce899e643b92dfce09133d181156844a3460592b90495913ee106e1261f33d986311478c12e1694deb3b72c6de3e78567e0dfd2851d545

  • SSDEEP

    6144:FHXm6YGNT0saL0TXOSgHnwr5yX7tfQN5/inEaMadDKNa1aIHgD:FH2FG90sH9Mns5yrtfQunka1KNaTAD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a$$.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:220
  • C:\Windows\SysWOW64\nvscv32.exe
    C:\Windows\SysWOW64\nvscv32.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$$a$$.bat

    Filesize

    152B

    MD5

    48306d083bf772eb655a81b6ae4345e3

    SHA1

    e5e4b1b7430c36dbe5e1f18ca55fed1d0e0d49ca

    SHA256

    4e07ef3d2da3805fe2dad456dd5e5465591a113059df9fe69da4cee1a1bb5d0e

    SHA512

    c516ee689a877f11c8c55f26dd153c101b4f31679d0e1a35e2f3fe1ba590b1a817258d14c876aad27562fcd63e342c01cc23bcabb04fd9d59085595ab78652a9

  • C:\Windows\SysWOW64\nvscv32.exe

    Filesize

    341KB

    MD5

    882b2e7c8bb781fc77351add3e7f6e63

    SHA1

    933bec1c429978c289657a05ab5b01e8fbbaac1a

    SHA256

    4e3e619b80b3204cdd841a2a6dac5a17da1222ad2cb56fb6f213b3131af6e462

    SHA512

    74a052095a06dc94b0ce899e643b92dfce09133d181156844a3460592b90495913ee106e1261f33d986311478c12e1694deb3b72c6de3e78567e0dfd2851d545

  • memory/1308-69-0x0000000001060000-0x0000000001061000-memory.dmp

    Filesize

    4KB

  • memory/1308-70-0x0000000001070000-0x0000000001071000-memory.dmp

    Filesize

    4KB

  • memory/1308-68-0x0000000000E40000-0x0000000000E84000-memory.dmp

    Filesize

    272KB

  • memory/1308-73-0x0000000000E40000-0x0000000000E84000-memory.dmp

    Filesize

    272KB

  • memory/1308-72-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/3464-35-0x0000000002640000-0x0000000002641000-memory.dmp

    Filesize

    4KB

  • memory/3464-30-0x00000000025D0000-0x00000000025D1000-memory.dmp

    Filesize

    4KB

  • memory/3464-32-0x00000000025F0000-0x00000000025F1000-memory.dmp

    Filesize

    4KB

  • memory/3464-62-0x00000000027B0000-0x00000000027B1000-memory.dmp

    Filesize

    4KB

  • memory/3464-61-0x0000000002790000-0x0000000002791000-memory.dmp

    Filesize

    4KB

  • memory/3464-60-0x00000000026D0000-0x00000000026D1000-memory.dmp

    Filesize

    4KB

  • memory/3464-59-0x00000000026B0000-0x00000000026B1000-memory.dmp

    Filesize

    4KB

  • memory/3464-58-0x0000000002660000-0x0000000002661000-memory.dmp

    Filesize

    4KB

  • memory/3464-57-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/3464-65-0x00000000027E0000-0x00000000027E1000-memory.dmp

    Filesize

    4KB

  • memory/3464-64-0x00000000027F0000-0x00000000027F1000-memory.dmp

    Filesize

    4KB

  • memory/3464-56-0x00000000027C0000-0x00000000027C1000-memory.dmp

    Filesize

    4KB

  • memory/3464-55-0x00000000027A0000-0x00000000027A1000-memory.dmp

    Filesize

    4KB

  • memory/3464-54-0x0000000002780000-0x0000000002781000-memory.dmp

    Filesize

    4KB

  • memory/3464-53-0x0000000002760000-0x0000000002761000-memory.dmp

    Filesize

    4KB

  • memory/3464-52-0x0000000002770000-0x0000000002771000-memory.dmp

    Filesize

    4KB

  • memory/3464-51-0x0000000002740000-0x0000000002741000-memory.dmp

    Filesize

    4KB

  • memory/3464-50-0x0000000002750000-0x0000000002751000-memory.dmp

    Filesize

    4KB

  • memory/3464-49-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/3464-48-0x0000000002730000-0x0000000002731000-memory.dmp

    Filesize

    4KB

  • memory/3464-47-0x0000000002700000-0x0000000002701000-memory.dmp

    Filesize

    4KB

  • memory/3464-46-0x0000000002710000-0x0000000002711000-memory.dmp

    Filesize

    4KB

  • memory/3464-45-0x00000000026E0000-0x00000000026E1000-memory.dmp

    Filesize

    4KB

  • memory/3464-44-0x00000000026F0000-0x00000000026F1000-memory.dmp

    Filesize

    4KB

  • memory/3464-43-0x00000000026C0000-0x00000000026C1000-memory.dmp

    Filesize

    4KB

  • memory/3464-42-0x00000000026A0000-0x00000000026A1000-memory.dmp

    Filesize

    4KB

  • memory/3464-40-0x0000000002690000-0x0000000002691000-memory.dmp

    Filesize

    4KB

  • memory/3464-37-0x0000000002650000-0x0000000002651000-memory.dmp

    Filesize

    4KB

  • memory/3464-36-0x0000000002630000-0x0000000002631000-memory.dmp

    Filesize

    4KB

  • memory/3464-17-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/3464-34-0x0000000002610000-0x0000000002611000-memory.dmp

    Filesize

    4KB

  • memory/3464-33-0x0000000002620000-0x0000000002621000-memory.dmp

    Filesize

    4KB

  • memory/3464-63-0x00000000027D0000-0x00000000027D1000-memory.dmp

    Filesize

    4KB

  • memory/3464-41-0x0000000002680000-0x0000000002681000-memory.dmp

    Filesize

    4KB

  • memory/3464-23-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/3464-29-0x00000000025E0000-0x00000000025E1000-memory.dmp

    Filesize

    4KB

  • memory/3464-28-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/3464-27-0x00000000024C0000-0x00000000024C1000-memory.dmp

    Filesize

    4KB

  • memory/3464-26-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB

  • memory/3464-25-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/3464-24-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/3464-31-0x0000000002600000-0x0000000002601000-memory.dmp

    Filesize

    4KB

  • memory/3464-22-0x0000000002450000-0x0000000002451000-memory.dmp

    Filesize

    4KB

  • memory/3464-21-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/3464-20-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/3464-19-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/3464-18-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/3464-16-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/3464-15-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/3464-14-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB

  • memory/3464-13-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/3464-12-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3464-11-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/3464-10-0x0000000002380000-0x0000000002381000-memory.dmp

    Filesize

    4KB

  • memory/3464-8-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/3464-6-0x0000000002360000-0x0000000002363000-memory.dmp

    Filesize

    12KB

  • memory/3464-5-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/3464-1-0x0000000002170000-0x00000000021B4000-memory.dmp

    Filesize

    272KB

  • memory/3464-9-0x0000000002340000-0x0000000002341000-memory.dmp

    Filesize

    4KB

  • memory/3464-7-0x0000000002370000-0x0000000002371000-memory.dmp

    Filesize

    4KB

  • memory/3464-4-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/3464-3-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB

  • memory/3464-2-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/3464-76-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/3464-77-0x0000000002170000-0x00000000021B4000-memory.dmp

    Filesize

    272KB

  • memory/3464-0-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB