Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 03:30

General

  • Target

    ba2ff4db21ff6ff028d09dda59220766_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    ba2ff4db21ff6ff028d09dda59220766

  • SHA1

    3a72544ad62019bb7df5dd0cc558457df92001d1

  • SHA256

    d2b0b88a263ca79cf5de7a454f7111df4a49afc548c773553569ae9477f8e708

  • SHA512

    00dd0f73862ff0565b514c9f3dc549066825ede58190a2958b6c63a47d65835668c009249896f2b3f7c7c250e320860052b6c13c3f699aa00e28937a2c9d6000

  • SSDEEP

    3072:qsT6PWSg4d4Fq7YAjsuwf0UbaxLAFE/qJJwCh/Myqt:jePW+d4Fq7YYsuwf/FKqJJV

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba2ff4db21ff6ff028d09dda59220766_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ba2ff4db21ff6ff028d09dda59220766_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\esplorer.exe
      C:\Windows\esplorer.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of SetWindowsHookEx
      PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\esplorer.exe

    Filesize

    192KB

    MD5

    ba2ff4db21ff6ff028d09dda59220766

    SHA1

    3a72544ad62019bb7df5dd0cc558457df92001d1

    SHA256

    d2b0b88a263ca79cf5de7a454f7111df4a49afc548c773553569ae9477f8e708

    SHA512

    00dd0f73862ff0565b514c9f3dc549066825ede58190a2958b6c63a47d65835668c009249896f2b3f7c7c250e320860052b6c13c3f699aa00e28937a2c9d6000

  • C:\Windows\name

    Filesize

    3B

    MD5

    03c2e7e41ffc181a4e84080b4710e81e

    SHA1

    6403f2b7eb2aaafe6de34cbf2a029b01afebc512

    SHA256

    18fdd549b2ed367ac0c74cbec1214644728515b30edbcb78e7d322757a7c8359

    SHA512

    6d6ec1f3bc0516934e6a101f209541eba6ae5a91e366bccb4494a0bc249c45521bc03ddbf186bac8fea25c68f73ceecef0463681e829986afc039026136c45b6