Analysis

  • max time kernel
    133s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 07:05

General

  • Target

    a19b5387ed1b8a3c818405f02feac41d_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    a19b5387ed1b8a3c818405f02feac41d

  • SHA1

    0bd853381d8fd80939024cdabf855623c034b678

  • SHA256

    e9d96a726fdc2e5684f02551849cdfc4202103548f48df65950aa871782280c6

  • SHA512

    8171511563985a6e34f47e713476fb17a65c3f0b75b6dcd266246508e8017823395d7257d7a06eaa868176af5c565ff03d2bc9b0a72ce6b22310ffaf2f623ddd

  • SSDEEP

    768:NGndX5hbH/5ziUHqffw4QL5sVmCvwXXqWA8AgjkKrB2tyFQEbr:Ncphbf5zBq24vK28Hjk2BiEbr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19b5387ed1b8a3c818405f02feac41d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a19b5387ed1b8a3c818405f02feac41d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yVUvd.exe.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yVUvd.exe.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 264
        3⤵
        • Program crash
        PID:3048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1052 -ip 1052
    1⤵
      PID:4016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yVUvd.exe.exe

      Filesize

      12KB

      MD5

      72bc2382cba6f480226ba4cc4aba9ab3

      SHA1

      c3fbd1cf7d93a5d30ccf2c728a0bbb453c6cd236

      SHA256

      3ea5e4088b2159326f52d36f08341887e6bb636664e5d8855016cb3bb4e0ccfb

      SHA512

      269974fcd802665e4a3505fe2bd2c48a0d9dfa8bbfd358be79d13877bbde85d2c62d19a521e4578da964dbd4460d762cbf756fb44f81036c1b58a66a6314384c

    • memory/1052-11-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1052-16-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3796-0-0x00007FF9A9875000-0x00007FF9A9876000-memory.dmp

      Filesize

      4KB

    • memory/3796-1-0x000000001B210000-0x000000001B2B6000-memory.dmp

      Filesize

      664KB

    • memory/3796-2-0x00007FF9A95C0000-0x00007FF9A9F61000-memory.dmp

      Filesize

      9.6MB

    • memory/3796-5-0x00007FF9A95C0000-0x00007FF9A9F61000-memory.dmp

      Filesize

      9.6MB

    • memory/3796-14-0x00007FF9A95C0000-0x00007FF9A9F61000-memory.dmp

      Filesize

      9.6MB