Analysis

  • max time kernel
    133s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 15:34

General

  • Target

    bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    bc54f6021bcf37cd41ad8c524dd5583b

  • SHA1

    b6254031f3d220d6dac5bbf0fb92802110d09cd9

  • SHA256

    b3aa9e85dabd5de8af0005182359662ff0cdaff24fc9053d1714cb7241d0e9f1

  • SHA512

    de647b0297508bb481a116ad1f4093b04c782e6974ac6177de931958602b3d9b4bc81b59fab86247760b3f8d7722a2f91bdf15416263885ddeeb31b4e6efaa51

  • SSDEEP

    768:9kRRLWJHgr9lx+tidYI+4hmDU4COMx6uqhZSMBOA6ObpMr2AAaWa5:9SpWJAr9lVYz4MWOxRCWOwXA9Wi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\Documents\Stub.exe
      "C:\Users\Admin\Documents\Stub.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Stub.exe

    Filesize

    126KB

    MD5

    0ff7e7ff8889b28b2a1575ae2e59c7da

    SHA1

    796199998a1b9f57d8080d1b9048976a94745fcf

    SHA256

    28454c3a64abc8d5d83831494ca9686bb12f2bf7998d5f8290acc06b4c4e9d1f

    SHA512

    7f6045f2cce01c435b36078f38651010b42eaf1826f3fe08ab94e816ee076a1d7fc9c06512bb4857a5154604ad6e42182666dca72f7ddd4dc1597ecfce9efab7

  • memory/3736-0-0x00007FF82AE13000-0x00007FF82AE15000-memory.dmp

    Filesize

    8KB

  • memory/3736-1-0x00000000007B0000-0x00000000007BE000-memory.dmp

    Filesize

    56KB

  • memory/3736-4-0x00007FF82AE10000-0x00007FF82B8D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3736-14-0x00007FF82AE10000-0x00007FF82B8D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3888-12-0x0000000000DB0000-0x0000000000DE5000-memory.dmp

    Filesize

    212KB

  • memory/3888-15-0x0000000000DB0000-0x0000000000DE5000-memory.dmp

    Filesize

    212KB