Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 16:03

General

  • Target

    aba8f987602f46702fd26af7086369c7_JaffaCakes118.exe

  • Size

    344KB

  • MD5

    aba8f987602f46702fd26af7086369c7

  • SHA1

    5a34541bceee57d661c30d44cf24fd35ee222991

  • SHA256

    c084016e963f753333601127fcb0b5fb5880f9ae6470767c16f5492de3605fd6

  • SHA512

    1320d622bbe6f2f47ffa827ce8957030a3b00881dc44ff69fa908fb6e0befded4e2dc310285862ac1947d56560bc455d537a85d43af99cca20f293dd8ec55ab6

  • SSDEEP

    6144:h1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe593l8Y:hjkArEN249AyE/rbaMct4bO2/VyY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aba8f987602f46702fd26af7086369c7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aba8f987602f46702fd26af7086369c7_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:4124
  • C:\Windows\SysWOW64\bfservice.exe
    C:\Windows\SysWOW64\bfservice.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\bfservice.exe

    Filesize

    344KB

    MD5

    aba8f987602f46702fd26af7086369c7

    SHA1

    5a34541bceee57d661c30d44cf24fd35ee222991

    SHA256

    c084016e963f753333601127fcb0b5fb5880f9ae6470767c16f5492de3605fd6

    SHA512

    1320d622bbe6f2f47ffa827ce8957030a3b00881dc44ff69fa908fb6e0befded4e2dc310285862ac1947d56560bc455d537a85d43af99cca20f293dd8ec55ab6

  • C:\Windows\Temp\zmdahmm

    Filesize

    4KB

    MD5

    bb71cd4ec7bc474d44236b9592e37e55

    SHA1

    4dab65f34443e98e357e5a0d833b0559ed8c54aa

    SHA256

    e353801221b87ea2aa7fa339cbdfdfb52fe46741bf2c3b08cb626e0258e299e0

    SHA512

    74ba2ae94ef9adc48ed369562f24e295fb5fa71fc5443adead4b9f6c4a2c7dc213bc032994b3be98cea1f698c05c200afbbf032570659f1af5b0556ec20e02b0

  • memory/1620-18-0x0000000000B60000-0x0000000000B61000-memory.dmp

    Filesize

    4KB

  • memory/1620-21-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/1620-24-0x0000000000B50000-0x0000000000B51000-memory.dmp

    Filesize

    4KB

  • memory/1620-25-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/4124-0-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/4124-20-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB