Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 06:57

General

  • Target

    ae408fbaa7d325e1dc6b82a9bdb04f6b_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    ae408fbaa7d325e1dc6b82a9bdb04f6b

  • SHA1

    8f3d2df59762bd64265240bccfd20a9d0c572fc3

  • SHA256

    e256f5e930620e54a5a3d182935f7c2bd59feec9d0ffd47b8ad347f5eecc4f15

  • SHA512

    f9af97a6074fef62939435b166e4ae6bc3d86c1c3c0ebe6a559c1b6925dc5bba6b2d3896b11781192e8e1593bda7728b99d3cbe214fef67fa45bbf6e38ef3bb9

  • SSDEEP

    3072:7kKZpCS0uj/jn8R6BgBwJfZqH7mTNbap2VftOphUF:7kaUSXzjGBGfYbQOp4fW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae408fbaa7d325e1dc6b82a9bdb04f6b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae408fbaa7d325e1dc6b82a9bdb04f6b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Usf..bat" > nul 2> nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Usf..bat

    Filesize

    238B

    MD5

    7d6ab3ea14a91fffbc1abb71db537dfd

    SHA1

    593f294f84a6ba3c8fef0405d60669296b146ecf

    SHA256

    af456edc303237e414fa58afba25f2b2e373135872e31efe631c8620062bd8d1

    SHA512

    9db61c2d316b14ac746490278a298ff62066a8972a237dce8fe75de75ee0ad7fe6af2f768b302ab630d1e8c5c7c86a661927b6d797acb14f0edfb1944aeec42b

  • memory/4024-0-0x00000000021C0000-0x00000000021ED000-memory.dmp

    Filesize

    180KB

  • memory/4024-1-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4024-2-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4024-3-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4024-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB