Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 17:23

General

  • Target

    a78cc2ecb3a05fcc22d96ae588a3ba26_JaffaCakes118.exe

  • Size

    104KB

  • MD5

    a78cc2ecb3a05fcc22d96ae588a3ba26

  • SHA1

    eac6eefcf3003dda9a8bc059fd7d6cc1cbd6f96b

  • SHA256

    11df808478c3860c2466150dd4275d6a2a6a26a089eb30088aca006dc6002cd4

  • SHA512

    78c448a9bbaa39d14133b569930a50402608e3ba38e86e9677dbbcbea7c8a500dfc77a4b3a2c6d6e09835a67a0c559bc9451c20940add5359444af1cf938c667

  • SSDEEP

    3072:ucZSPfENKVVSAsunYsnzMBafD+QtNdpKx6p7zh1ZSi9:+fqKHSg3xjp/pN1ZSC

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3456
      • C:\Users\Admin\AppData\Local\Temp\a78cc2ecb3a05fcc22d96ae588a3ba26_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a78cc2ecb3a05fcc22d96ae588a3ba26_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Users\Admin\AppData\Local\Temp\Thumbs.exe
          "C:\Users\Admin\AppData\Local\Temp\Thumbs.exe"
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5048

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Thumbs.exe

            Filesize

            12KB

            MD5

            35709dfad713907869f2781ce4ac8185

            SHA1

            156e88037be465d0ba2edad839b79a2289a6efda

            SHA256

            7eb08a3f145217614b429abf3fca3a55f3da114357670ae00f9ce998b8876639

            SHA512

            35b05bc246364e5b664265681467def45621535151c11612c0c47310f446f4e93daa0c2bc788ab8395bd07d7607cecab19b62fc6b29350304c6345e1c0721c95

          • memory/2328-0-0x0000000075102000-0x0000000075103000-memory.dmp

            Filesize

            4KB

          • memory/2328-1-0x0000000075100000-0x00000000756B1000-memory.dmp

            Filesize

            5.7MB

          • memory/2328-2-0x0000000075100000-0x00000000756B1000-memory.dmp

            Filesize

            5.7MB

          • memory/2328-12-0x0000000075102000-0x0000000075103000-memory.dmp

            Filesize

            4KB

          • memory/2328-13-0x0000000075100000-0x00000000756B1000-memory.dmp

            Filesize

            5.7MB

          • memory/5048-11-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB