Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 16:50

General

  • Target

    d000ac261677ebb7263d0ea396c68202_JaffaCakes118.exe

  • Size

    63KB

  • MD5

    d000ac261677ebb7263d0ea396c68202

  • SHA1

    99fb6d25d05313e76ad6774409f117a5f5076d58

  • SHA256

    4038455a9e9bd570723b07d7dcb651a68a20a8ab2ee33da678502e8751c0ce6b

  • SHA512

    b5a0c3a8c9f9c63367ea4000f3d69c040dfe03e82cfaf59265e9036fe20d714a6a1eec00e8e0578cb5b434eade4d41ed76b1412cefa824c1736b288b655aeaa2

  • SSDEEP

    768:JUOcqHNW38mzs/LyFfAZcXkSKVW/aZrFDmJz4KsJFuxGo22d10d1CWRfAvPjzdyB:WOcH384ciX96DmJ4Kys2PqBPHWciaBg

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d000ac261677ebb7263d0ea396c68202_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d000ac261677ebb7263d0ea396c68202_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gjp..bat" > nul 2> nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Gjp..bat

    Filesize

    238B

    MD5

    2b6b6163f92da46a4fca929122c2b5da

    SHA1

    35e2bee5fe9b07622da65e4b837da4ec78f57b61

    SHA256

    0ed28e65f080f23d35f7e35d5d6df286155f9b9f46aa33dd4894a8e4d6410732

    SHA512

    e626e4780fe7bcb64433a112b35af61058254849bd87ebbe634f78ec016d2d88aa8c6adbf1d6d314df1f6a88761241fe5c0e38ffc9c79b927e57b72dd6ad9775

  • memory/1512-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1512-2-0x00000000005C0000-0x00000000005DB000-memory.dmp

    Filesize

    108KB

  • memory/1512-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1512-4-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1512-7-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB