Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 12:58

General

  • Target

    b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    b38b434a32ef25b5c5cde70bef6a3be5

  • SHA1

    bf15f1585e8676fbfd3acd972ab522a8630311dc

  • SHA256

    3eeac00ea7f4165bcc97bfd2423980861587672def9679029b803e252aa65c4d

  • SHA512

    a6d9230b5de597034f6aac96dc1d0d2f9bbd03c7849306a2077e959528f8bd91df9703ce9156944fec38f4abf778676df694f60484a1db978027578b14146b1f

  • SSDEEP

    49152:dpToKhpUcKpn8xO9d021MYqD9BP/n3NHj:UKjUcKJBK21MZDXP/n9D

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Users\Admin\AppData\Local\Temp\kb0.136.exe
      "C:\Users\Admin\AppData\Local\Temp\kb0.136.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:408
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 1036
        3⤵
        • Program crash
        PID:4820
    • C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe
      "C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Users\Admin\AppData\Local\Temp\is-5BS1U.tmp\is-QEUAB.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5BS1U.tmp\is-QEUAB.tmp" /SL4 $130052 "C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe" 723322 50688
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1500
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 408 -ip 408
    1⤵
      PID:4904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe

      Filesize

      913KB

      MD5

      e09153f89a7fee92f24192d58a453254

      SHA1

      723406bb4841cb02794c611515664fd9abfe3f3b

      SHA256

      fcdbe26ad10ff3ee32984c16f3b72cfcf32fae4c028e66dd9450c403138a25a1

      SHA512

      5ce34fc091455881f5d693769c1ee9430d3a49659fc03491dd46adac3a803d963e0dee0c71743240c4429b5d189adeff29c56516f67b4874e005cecf95c26b18

    • C:\Users\Admin\AppData\Local\Temp\is-5BS1U.tmp\is-QEUAB.tmp

      Filesize

      572KB

      MD5

      0d0622f7d2fd629455a028d7e1cb1c07

      SHA1

      82bdfc15f188241c535d7a42f0f95c99d0913bf4

      SHA256

      ab0982c120a65adc3aa898af09ad923c9b896edfc52f7d206798c5fdf59d8f5a

      SHA512

      eb5a930c1ba85b9cdb60a65fcead39592f7a1b87985d927580bbdb9f8682087291a4eac9f5b2f7c8d4aa7abff78ce8c53dd7285bd7be8572cb65ade906e8807a

    • C:\Users\Admin\AppData\Local\Temp\kb0.136.exe

      Filesize

      912KB

      MD5

      94beee2d6abd0cbb1667fa634fd39662

      SHA1

      2a108abe8675e52ae76a5dbc6f8596784472e62a

      SHA256

      a00384a1b1b311f280f9c2f4f7b9b81a1ada1596956e753c3f148fe29cc645e2

      SHA512

      e6eb3183badd8d596282ba902e012069cca36318b87dd92fb0dfe569f1c28f7e55c3ff724d938edd38b867ff2041e9cb248df9e1242d45a85c382e0115ad11bc

    • memory/408-18-0x0000000000400000-0x00000000005C2000-memory.dmp

      Filesize

      1.8MB

    • memory/408-43-0x0000000000400000-0x00000000005C2000-memory.dmp

      Filesize

      1.8MB

    • memory/408-41-0x0000000002200000-0x000000000229A000-memory.dmp

      Filesize

      616KB

    • memory/408-32-0x0000000000400000-0x00000000005C2000-memory.dmp

      Filesize

      1.8MB

    • memory/408-29-0x0000000002200000-0x000000000229A000-memory.dmp

      Filesize

      616KB

    • memory/408-24-0x0000000002200000-0x000000000229A000-memory.dmp

      Filesize

      616KB

    • memory/1500-39-0x0000000000400000-0x000000000049D000-memory.dmp

      Filesize

      628KB

    • memory/1500-45-0x0000000000400000-0x000000000049D000-memory.dmp

      Filesize

      628KB

    • memory/3768-21-0x0000000000400000-0x00000000005D4000-memory.dmp

      Filesize

      1.8MB

    • memory/4736-31-0x0000000000401000-0x000000000040A000-memory.dmp

      Filesize

      36KB

    • memory/4736-22-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/4736-44-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB