Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 03:29

General

  • Target

    b62dbb02da54f956ca470e96ae40a177_JaffaCakes118.exe

  • Size

    240KB

  • MD5

    b62dbb02da54f956ca470e96ae40a177

  • SHA1

    c3adc1eb4b03c527e4262ec33670c21364aa05cf

  • SHA256

    f4114c886b882aded98bce5a5d1b7c420eead126676e57269b1fb3f0736ee5af

  • SHA512

    015f48467b0d7e0b318ae09455b70bdd7215fb1e0a1fb459dfdcc4d5cb67672de5f0ee8067bc9d0fc281709e5798ea9b675896ab6c779bf914a53fb0bc716396

  • SSDEEP

    3072:eqzhsX+Yq7CO/G890nRJwHsoVrGNB355KfCtEcOZ+mwuHrmlhI5o1hI:/sX4Ju890noHbYJMWETPHrmnI5o

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b62dbb02da54f956ca470e96ae40a177_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b62dbb02da54f956ca470e96ae40a177_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\Invisible Checker By__M-A-D__.exe
      "C:\Users\Admin\AppData\Local\Temp\Invisible Checker By__M-A-D__.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1896
    • C:\Users\Admin\AppData\Local\Temp\Invisible Checker By__M-A-D___.exe
      "C:\Users\Admin\AppData\Local\Temp\Invisible Checker By__M-A-D___.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Invisible Checker By__M-A-D__.exe

    Filesize

    27KB

    MD5

    00ac02c2a7854effdd4eb5f682b19a90

    SHA1

    0695759b50a03dd3b06e46d1e21300c582b70e71

    SHA256

    3e6fdc44b7671ae1a593e2e30a53a0b797d15c30ef4c4f4c146ec6424c299f25

    SHA512

    3d36460eeb807d63ae301b1f6be1c5df3813027de36bd9bde8f4412f92e8d814b49d2a7f1fe5022c369d79f0ef85e39e89f5486fee3e2bf1f2aa0f7e0db011ff

  • C:\Users\Admin\AppData\Local\Temp\Invisible Checker By__M-A-D___.exe

    Filesize

    139KB

    MD5

    5c512efa1ae331f331e3f5624d80697a

    SHA1

    168bb02ad7934b2810eb70f44d982805473a2539

    SHA256

    e558457426ee18077b901fd249b0ebe1d710583fbfdb9308c38870798c16914f

    SHA512

    c5f4bab4a02040c5d0c4e13a2f5ad92a00ebc924abeded65cd94134d6f741ac309a3db9b267df1f8d5a8cdc682b76580d31fb6586895e3c70c89b688b92422fc

  • memory/1624-27-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/1624-1-0x000000001B770000-0x000000001B816000-memory.dmp

    Filesize

    664KB

  • memory/1624-2-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/1624-4-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/1624-0-0x00007FFA09B15000-0x00007FFA09B16000-memory.dmp

    Filesize

    4KB

  • memory/1896-26-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/1896-24-0x000000001B680000-0x000000001BB4E000-memory.dmp

    Filesize

    4.8MB

  • memory/1896-25-0x000000001BBF0000-0x000000001BC8C000-memory.dmp

    Filesize

    624KB

  • memory/1896-28-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/1896-31-0x0000000000900000-0x0000000000908000-memory.dmp

    Filesize

    32KB

  • memory/1896-29-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/1896-33-0x000000001BD10000-0x000000001BD5C000-memory.dmp

    Filesize

    304KB

  • memory/1896-49-0x00007FFA09860000-0x00007FFA0A201000-memory.dmp

    Filesize

    9.6MB

  • memory/2140-30-0x0000000074D12000-0x0000000074D13000-memory.dmp

    Filesize

    4KB

  • memory/2140-32-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-51-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB