Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/08/2024, 22:08

General

  • Target

    94ed34a02313d6402936e4189e09707c_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    94ed34a02313d6402936e4189e09707c

  • SHA1

    17584149006fe7fc65fce8a08bc7bd068082e56d

  • SHA256

    222293c966658c798efb0a2d31a0e6db2bf98aca4467336adcab97dc09b282d2

  • SHA512

    97065ad60c76fec6adba2b89fae45fcc1dd955c70a9f3ad090527b8982a65e4ab1530a071d335b954bd49c14926c3fd5f732f4d2bf4644a78aa6ed7c7bff0169

  • SSDEEP

    3072:t/yurJxSZI89txrraN2D1M17rpqJmf2sCCYXAy9lmqfRO4C:9rzg9z2N/7roJCCCV2Y0RO4C

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94ed34a02313d6402936e4189e09707c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94ed34a02313d6402936e4189e09707c_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\94ed34a02313d6402936e4189e09707c_JaffaCakes118mgr.exe
      C:\Users\Admin\AppData\Local\Temp\94ed34a02313d6402936e4189e09707c_JaffaCakes118mgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4868
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 264
        3⤵
        • Program crash
        PID:1952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4868 -ip 4868
    1⤵
      PID:1832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\94ed34a02313d6402936e4189e09707c_JaffaCakes118mgr.exe

      Filesize

      104KB

      MD5

      84b7783804fa7506672a409e9899c6be

      SHA1

      2da8a6e9c04662564e18cdf98f73e224a5662533

      SHA256

      b26a93c17ac6a412c6c191aa6a1543537f3185fe813c24153c6dec736fbad4ef

      SHA512

      8a867296b05f45dd79ab64b11b6cc0cc8fad835b2f5ba9b8469981cc9b3e15c91f98b688cbe7addfab7ea2bd55a1d475fc853c004afb24be1b5691f8183c897c

    • memory/1200-0-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1200-9-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4868-4-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/4868-6-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/4868-8-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB