Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 19:50

General

  • Target

    d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe

  • Size

    13.6MB

  • MD5

    d0563cb3c7aa6d5ee73edfa2acdb8ab1

  • SHA1

    7572c995926524332c81a64682cf21bda26a83b2

  • SHA256

    701337aeec59e62e19324ccd027966fc6f09134fbcb8ea8fcc60db96b294d84a

  • SHA512

    46ca58ff0bcc22a4e58f1211413cba331f136f397e280e00b67cb6300242b0c55783ab0d0dc73d3d6e7dfb79ad1725eacdea9384ae2eedf121a1acb56922bdd5

  • SSDEEP

    192:c2/2VgqKGxmQtAy2dNQOa099GfsvYgmhT9zHJxhlQtAwimP1oyG+Ra4:c2/vg0xlGHjRNvQtAjQ14+l

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\Googlenk.exe
        "C:\Windows\Googlenk.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\Googlenk.exe
          "C:\Windows\Googlenk.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Deletes itself
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MyTemp

          Filesize

          84B

          MD5

          c23c22dc4fc9c130318debeea01d10cc

          SHA1

          2d3208c829e62dd5bb597f630734d37c8709befd

          SHA256

          f2fa083c809b87244f666da1e2f94b4e117df01d5505f551d5232c76c8316629

          SHA512

          2834e0481f271fc494577496a005a34b36648134c04a1ae800dea1d39b29da48c0bd7f3924ba4d93e8685db126fed04c627c414bdcef07c7d99b29931364e685

        • C:\Windows\Googlenk.exe

          Filesize

          22.4MB

          MD5

          bd803e095733f5d14556696e1c92e0f1

          SHA1

          c691182ba6fe5ecae2246483a5f3f7eb15e76b4e

          SHA256

          6dca03a752619045872ad86b63568ca962ed5d0298db46b7741626dba0f57e00

          SHA512

          cbc85e7958c749aab2d5abf79ae7ac7f3d0b4e3d2d62660b2b60d08795cc0c6a3cec048683db0e1b7f5a5608c6954d2589de593b236b6b5926191f21a2a7dbb5