Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 13:17

General

  • Target

    8edf14743d9aad6c902495b146eec0cc_JaffaCakes118.exe

  • Size

    2.7MB

  • MD5

    8edf14743d9aad6c902495b146eec0cc

  • SHA1

    bbbbff3c19319b4b511b44ee5a3cf77c122cc87b

  • SHA256

    1de72c999674ec019d04ad28d946e0ebb3b6f6e29ccdd3284f152804e7791583

  • SHA512

    1f9c4cb1e9bd0c54b4b658619a8945c8ae64d53060896c7a8f248582383affdbe68265472e40e03edbaca2f84f75b248454d1320be5dec2da6f944d8b884caac

  • SSDEEP

    49152:RH73q/dlUyNJ+TBGxZykI9vA6qX9B9RElKBG1O:xjq1N44WEXP9RElKB

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8edf14743d9aad6c902495b146eec0cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8edf14743d9aad6c902495b146eec0cc_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2244
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    2004bcee923b0e0222f4cab87c2c2a3d

    SHA1

    0a3c122b7cfe403403d913ecc1b328480b1bfc2a

    SHA256

    f92f08df2b65e2f5b5db141c99b098c8b077c0c853a1fd51bfcc6d40dc68ad77

    SHA512

    cae47a4dfdb942622ebca65d57e9d80c29cb299aa8c217983e34a51655c2e96ed26c7fa2fad978b6279ed4d3c8c0571e417c60152bf66a116f67d0fe38d6a445

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    735B

    MD5

    ab30cd65368593be3630eb57fa9f492f

    SHA1

    b53eaebf5aa24e07f4a7362bdc8cc27c4d970626

    SHA256

    35a2275e81de9587a22894228080055e876229b76eabcb1ced83df06b85f8b1f

    SHA512

    92a2acd8068a2527342b80e861ac7a619fcefbd0e1e546e878948514fa7e998814874c9ef834cc9535dfa96e4389e2b757bc03697935d0e0f62580a505f4dd43

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.7MB

    MD5

    c330829b14368333ddd30ebc24fcfec0

    SHA1

    716ec0106f24e8cc9dcbfd5fef1760ab198f5c56

    SHA256

    8851be3c8978fa2f698632e45a961eba00f9d27649f4973fd08faec98e946725

    SHA512

    f91eb2fefc5955214b6250707c7896decaecd5c7884ea44a354639baa865e6a1d4ff8896b82ba7e58be671e84cc0aaf53280b48f185f349486781f35b0c3abae

  • memory/4788-0-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-16-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-19-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-22-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-26-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-29-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-32-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4788-35-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB