Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 20:22

General

  • Target

    d06350562ec98acb89c7a9ef020288ee_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    d06350562ec98acb89c7a9ef020288ee

  • SHA1

    5a49da1cce08f169542b9bdccb91e35149b32c17

  • SHA256

    af1bc6af103e9ea3bd96946812717234b4642a8a1c7e1986bdf1b9cdc3d994f9

  • SHA512

    4d8eaa98b3e9248b89367295eb09357c584a3a68daada747c0099f57247cb7dd55729d896236f8412843a53715a76ea490f025d10aee09f5405e66541434a5dc

  • SSDEEP

    192:sT3PnEUwdhRFAH0EuFjgWgK0F7MrwhPUISj5yevcoQa9o35L02K45sV4:sT/BwdJAHzWgKiMsuhKoRu35+45s

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d06350562ec98acb89c7a9ef020288ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d06350562ec98acb89c7a9ef020288ee_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\n.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\n.bat

    Filesize

    215B

    MD5

    4cb0929b5c1de247e741b096ed26fed1

    SHA1

    1cdcbb5f83d8e46439223f68071692db197b803c

    SHA256

    8d59587948340c9c9885c5f07375e606a12cac4153b2702b4ceb7c917ad2bcdd

    SHA512

    4a008b08ca77e572a39053adc916c0a6353d21aded48fd93c27e9cdbe42e3b89187bb72fbad9395529a14f6720373eb1f523b94b08e2df19173918b9a556ce5e