Analysis

  • max time kernel
    143s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 14:07

General

  • Target

    a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    a2d65aa920a0b46183500e8ac03dd888

  • SHA1

    abfdf05f5732315ea4704fa345b956a49fb286cb

  • SHA256

    6414f9993f90a81637935cfaa9643aa5f6c20df1cdd4bd6cbf2191ff3593b293

  • SHA512

    7a36cae9e7e39775f4184172db5719aa1218c5c512ed81b2e8d3367b092a93e0b074648f490951e866b488dbbb7e57c0b3fd34699670e82133461135f6bcfc9b

  • SSDEEP

    6144:J4lRkAehaKuqT+FjblnpYPWx5U418Lw+dlG:JkWAehJuqT0pYPi5ULdlG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\smss.exe
      "C:\Users\Admin\AppData\Local\Temp\smss.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:3004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 700
        3⤵
        • Program crash
        PID:4100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3004 -ip 3004
    1⤵
      PID:4804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\query.txt

      Filesize

      6KB

      MD5

      8a4eee88bbb0250b889cc4bca466edd5

      SHA1

      163011e4516d273b5dc5a6161e83e2c1ff31a384

      SHA256

      c9d9aceb927174fb00e367a00a6b604c85a6f028fe667e36dc54d9bd63266aba

      SHA512

      22417c6f0303f180dca62b6d543ecba2ba347516ff956394bafe13d4ed004d1026c24c93828cda50ca909faf34436942e52c7c8473578c0ec0f1e516f96517ca

    • C:\Users\Admin\AppData\Local\Temp\smss.exe

      Filesize

      58KB

      MD5

      8a6ea882564826b400284976a9455efc

      SHA1

      66723ae75ea688a91046208805f679aa8bb0ce31

      SHA256

      932157b8abcb82016af7b38eec423a570c291eaaa79fa2464eba362796ae66e7

      SHA512

      b9304a2ad05250000971e98117da8c173effa5f8673d7ad58dfa457669245e8f7bd94dfba744d02b1235573e7b09c019cf0824338b946cfe3fffcf4e337cf705

    • memory/3004-11-0x0000000074EA0000-0x0000000074EF2000-memory.dmp

      Filesize

      328KB