Analysis

  • max time kernel
    144s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 23:38

General

  • Target

    c1d41921c610fb2ca8e109709b70d30c_JaffaCakes118.exe

  • Size

    174KB

  • MD5

    c1d41921c610fb2ca8e109709b70d30c

  • SHA1

    a04f50d421756853f80263b79f4082860d613c53

  • SHA256

    ebc97f870255be785d7f0ce7a08d06b7bf95d0fcc6a4417a0d7f51ea38cfdeb0

  • SHA512

    39ae8065e8a40d65fde10c18e72868592154204c08f0e899cf979769180c18f796b8d4a3f1e441f8dff7a77d68580b18ad69c1cd7feff6aa23cecb86da97b205

  • SSDEEP

    3072:WwxVMhOC/dTDbq91+mno3t4QZQ3rYJRDqb0UsUSburtwgtDBxZ7nqrdLj0U7:WTfFDbRnOTrYfDqQUZrdxBOdLj0U7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3392
      • C:\Users\Admin\AppData\Local\Temp\c1d41921c610fb2ca8e109709b70d30c_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c1d41921c610fb2ca8e109709b70d30c_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\server.exe
          "C:\server.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4064

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\server.exe

            Filesize

            31KB

            MD5

            9049fb3f4a7f4a5e0fc087264aa1e78c

            SHA1

            090a664ee829de8b5c14d1ba09d50950c67ef8f6

            SHA256

            bf59b931cd462d43ab8d3c2e142a3a2aac823cead8e7b9cc9ecc2cd3ed80970e

            SHA512

            5a804e3f4eb008cf082da45341f9ccc39c3fbc089b9ae476a3f0b379e8231ba7393ac530ac17c57da434d287bf6dde331196187caf5f0a8770188fae752ea5ff

          • memory/1040-10-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3392-12-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/3392-13-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

            Filesize

            4KB

          • memory/4064-8-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4064-11-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/4064-17-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/4064-16-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB