Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-08-2024 21:09

General

  • Target

    94bec218a195458cdda123860f623557_JaffaCakes118.exe

  • Size

    185KB

  • MD5

    94bec218a195458cdda123860f623557

  • SHA1

    a81497dedcbd8e50d3fa2464eb9d406fff5b4d53

  • SHA256

    c535cd3d3513af88830ba7c1733e59f48731a0aeb66e9affa425594698649a5c

  • SHA512

    b54905cb63c0c385fbd6e879ef6c2d85a40fefc4d6a978d93937f3f7ea4c3bdc9a88a8aab57c466740dba6441fe92fe033920e34e69c2f7db5f4fbd31ac034f2

  • SSDEEP

    3072:kcPczY9zvkUD2piBhNZAxdJIeQ7hqrw1o98PsMBv3MCmJpwkIIUGzq+:ksc89zrRfKx/8GcsMBvMCmJprUgq

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94bec218a195458cdda123860f623557_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94bec218a195458cdda123860f623557_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe
      "C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      PID:60

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe

    Filesize

    185KB

    MD5

    94bec218a195458cdda123860f623557

    SHA1

    a81497dedcbd8e50d3fa2464eb9d406fff5b4d53

    SHA256

    c535cd3d3513af88830ba7c1733e59f48731a0aeb66e9affa425594698649a5c

    SHA512

    b54905cb63c0c385fbd6e879ef6c2d85a40fefc4d6a978d93937f3f7ea4c3bdc9a88a8aab57c466740dba6441fe92fe033920e34e69c2f7db5f4fbd31ac034f2

  • memory/60-37-0x0000000002090000-0x00000000020D2000-memory.dmp

    Filesize

    264KB

  • memory/60-36-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/60-29-0x00000000022E0000-0x00000000022E5000-memory.dmp

    Filesize

    20KB

  • memory/60-30-0x0000000002340000-0x0000000002341000-memory.dmp

    Filesize

    4KB

  • memory/60-31-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/60-32-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/60-33-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/60-34-0x0000000002320000-0x0000000002321000-memory.dmp

    Filesize

    4KB

  • memory/60-35-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/60-28-0x0000000002090000-0x00000000020D2000-memory.dmp

    Filesize

    264KB

  • memory/4416-11-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/4416-8-0x00000000023E0000-0x00000000023E5000-memory.dmp

    Filesize

    20KB

  • memory/4416-5-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/4416-4-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/4416-3-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB

  • memory/4416-2-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB

  • memory/4416-7-0x00000000023F0000-0x00000000023F3000-memory.dmp

    Filesize

    12KB

  • memory/4416-27-0x00000000021D0000-0x0000000002212000-memory.dmp

    Filesize

    264KB

  • memory/4416-26-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/4416-6-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4416-9-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/4416-10-0x0000000002450000-0x0000000002451000-memory.dmp

    Filesize

    4KB

  • memory/4416-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/4416-12-0x00000000022B0000-0x00000000022B1000-memory.dmp

    Filesize

    4KB

  • memory/4416-13-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB

  • memory/4416-14-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/4416-15-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/4416-16-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/4416-1-0x00000000021D0000-0x0000000002212000-memory.dmp

    Filesize

    264KB