Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 17:12

General

  • Target

    bc9a77d80952b0995f5bc02673433978_JaffaCakes118.exe

  • Size

    628KB

  • MD5

    bc9a77d80952b0995f5bc02673433978

  • SHA1

    5db41fe7fedc852ae5e1f0351adc436adad74c2e

  • SHA256

    29ba639812ea8badb9ce8ca672c54840e57d2877519de438e87fbf32441df4ee

  • SHA512

    1de87a96b29de3c5785a9b45c816d35220ecbe65ccad799ec90d69faad81cc5d8d4bd82599ed360883f7d5f9123e4896de96db5aad4baed2d40afde7abe58488

  • SSDEEP

    6144:QsHsthcdRsISwBVz9E/TLvx8TYawAzUaZO2viDfnGU0xYXhHHMMOSMAbJJ9g0xYj:Ie/Swjz9E7o/SavsoYXhnYAyoYXhnYA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc9a77d80952b0995f5bc02673433978_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc9a77d80952b0995f5bc02673433978_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\OrganizerOpenSave.vshost.exe.exe
      "C:\Users\Admin\AppData\Local\Temp\OrganizerOpenSave.vshost.exe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\64bitProxy.exe.exe
        "C:\Users\Admin\AppData\Local\Temp\64bitProxy.exe.exe"
        3⤵
        • Executes dropped EXE
        PID:1868
    • C:\windows\system32\lcv0ji.exe
      C:\windows\system32\lcv0ji.exe
      2⤵
        PID:1560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\64bitProxy.exe.exe

      Filesize

      314KB

      MD5

      7b5d5b1b96a3429c8eb646894d2d8934

      SHA1

      c090f183d8e2f845ec08a4662d9354ec475d371f

      SHA256

      fcb0df1d3ea3e1bcccb278c94d3dd2b5d735d04066429868ba5c3b6cfb36b794

      SHA512

      78dbbd9e709acadb2c41a5a44bb5fa41ae32b7ab2720cf61893013c993e1f5f380651b98d6e25e3ba6fa01691fbe0f7a37f29de3a913463f4150709c49dcf133

    • C:\Users\Admin\AppData\Local\Temp\OrganizerOpenSave.vshost.exe.exe

      Filesize

      471KB

      MD5

      1774725ffdbc158eb05e3b30bb93b2cb

      SHA1

      40a9a7f0b343a1f9f7e5fb6816913a0228096b86

      SHA256

      156d9af3e7b6cf238eff0175bda52611f62ca12c093c766bfd4da145a52146bf

      SHA512

      a2e38bb96825bce55e160f7e1cbe592f5f85396552c1224fc770b4d0738513ad23a6399de394f23d8d2986b257a49635632492cf01dc82f50683f4464072d7b1

    • memory/4436-19-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-32-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-34-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-18-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-16-0x0000000000900000-0x000000000097C000-memory.dmp

      Filesize

      496KB

    • memory/4784-15-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4784-0-0x00007FFF42913000-0x00007FFF42915000-memory.dmp

      Filesize

      8KB

    • memory/4784-1-0x0000000000280000-0x0000000000324000-memory.dmp

      Filesize

      656KB

    • memory/4784-30-0x00007FFF42913000-0x00007FFF42915000-memory.dmp

      Filesize

      8KB

    • memory/4784-31-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4784-4-0x0000000000C00000-0x0000000000C08000-memory.dmp

      Filesize

      32KB

    • memory/4784-3-0x0000000000BD0000-0x0000000000BFA000-memory.dmp

      Filesize

      168KB

    • memory/4784-35-0x000000001C8C0000-0x000000001D04E000-memory.dmp

      Filesize

      7.6MB

    • memory/4784-38-0x00007FFF42910000-0x00007FFF433D1000-memory.dmp

      Filesize

      10.8MB