Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 13:46

General

  • Target

    d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe

  • Size

    8KB

  • MD5

    d21201b6c3cf1c33824b9ff711e152d8

  • SHA1

    2f091d4481454d178972f54e654f67e58a6b7856

  • SHA256

    b5bd63bdad5ed476fdf6883171a28b5d71bc12d868b73628d735a02ef748e88c

  • SHA512

    0cc9410b736f4858f1ed79cbd7c58c0e1178b5e36096d16c46dee8988b0dd2401fa87a5c5767aa38ae65a4829d21607a146cdf21be9cae9dff42433a0590d922

  • SSDEEP

    192:9hAMOYGYFE+p1BRz++XRKqsXdbSxKdXsFaNJhLkwcud2DH9VwGfct8uU:9eMOiS+pJa+XRYXdbSMdIaNJawcudoDN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\926C.tmp\batchfile.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3920
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe

    Filesize

    9KB

    MD5

    900d66283b07887e83b006628e5da178

    SHA1

    d9a43d315735e796546032e1ba9384739f476b10

    SHA256

    923324d6109ef001bed6788b90fcd49deb86a2e29ec49b99ca06792607bb938e

    SHA512

    c28c825795ec8de3f368cdb39ce9275aeebf7751d83711ddb8eb0670bdbf21b0b7cae6281e50bc79ae0365d8d2e95b951f9a102ca26e34a58c09f19fb0ef83e1

  • C:\Users\Admin\AppData\Local\Temp\926C.tmp\batchfile.bat

    Filesize

    1KB

    MD5

    39a7259277fa2bb831ea26bf67fb53ea

    SHA1

    5e48b5d1c1812ec605d3b748e870ac0b340bfeec

    SHA256

    a454d982de66d789dc8c9f03c4b430b18baad96503441caaa92b37b353f17459

    SHA512

    018257da76f6e92a6466fb41cb51757b07d11ff987e2673d7b6b57c65dcd01d9908b9712e1a8a2978976c28fa565ec0b6a8a1fb9b777f4544043159c93fbfb68

  • memory/2072-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2072-11-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3612-8-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3612-15-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB