Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 00:27

General

  • Target

    c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe

  • Size

    2.7MB

  • MD5

    c1e8bab3c5ed255d7ff964f32f7e1f74

  • SHA1

    bbfbf1437eec181473b8328eb24368ced4b34bdd

  • SHA256

    e7c7458e55faf52c86b67eba26d006733898e9f28fd69eff7cf85218fb9c5ca2

  • SHA512

    5e079f67e3da9cb59926f821e52ead42c57192fe4ee7cf7f8406ff5a2150e89bf04f3bc844b582a42ddb90eb713296a8a6a6f1aa9d0a2694bacd197b61f1bbc8

  • SSDEEP

    49152:AwfxsUM6BmxTHqz2E4j8rGKPaMTBZTzcjjzXRrP+9EYemB90t:AwA6sxTHqnz6KPaMjejT8aiW

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Program Files\Windows Defender\setup\Windows Desing.exe
      "C:\Program Files\Windows Defender\setup\Windows Desing.exe" NULL
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Defender\setup\Windows Desing.exe

    Filesize

    592KB

    MD5

    5663d485e7b624b2e9ab05b3963b223e

    SHA1

    0a7652726386444f683ee3cf6e28bf847725b144

    SHA256

    7b017140b668c327e5e2c083a84936c904e48384c4e6ddb02063a0163faa09c1

    SHA512

    602a50ab089322242f628f75c4d588f82833fe306d2e793d1e8d3cca61def9551526b25f649971e2cae106844c213781b95a9bff159bf373fa01d0f28fb80090

  • C:\Program Files\Windows Defender\setup\alkare.fok

    Filesize

    588KB

    MD5

    b9f4559edc815e78bfd5f17aa4b16a21

    SHA1

    8db1c7f3427c5d5d27d0f12f947e86f961f9eeb1

    SHA256

    f802daefa352d67b56ba50121598bc65b4fabc815c189baba6d6db01de59fe38

    SHA512

    76cf0b13eb03507b60060797a3b52230185c01ebcdde6c612ebce9bbd71b5c425e2620e6b5504ea6cd17207411148cd4aab57657ab646e786cd9daa318fd9276

  • memory/116-16-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB