Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 19:38

General

  • Target

    d2b0f2d801d41c8d5b90567b08c07298_JaffaCakes118.exe

  • Size

    108KB

  • MD5

    d2b0f2d801d41c8d5b90567b08c07298

  • SHA1

    d16a86fe9f197122d1d5da25158e1469892dc00b

  • SHA256

    59e8889d9847fb23f4062494a9f73a8ba772e39437f2751c8ea87ff6217255ca

  • SHA512

    8d6b52a49df739db4c3fbcf2d99e2f96cc1a119020e6387a27726e7d7899c02604e183863b6ed3c0e3b495ccef5dc890521d86fda5657b1082df3a2f9b7bf5b2

  • SSDEEP

    3072:KzNWMKKRZYchObK91C8sV6Xmoo4LEpYmHm1jyF:KZuuObR8sVImcyYmGU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2b0f2d801d41c8d5b90567b08c07298_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d2b0f2d801d41c8d5b90567b08c07298_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\virus 2.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\virus 2.bat

    Filesize

    3KB

    MD5

    dd583829457cb83407be1d15d5343643

    SHA1

    27da274b0f6cc848d5111666fc4d2d5d93dd1605

    SHA256

    0879736100e43cc8d9ebb1c7cd7830ea443759157a0781e4b21d3427cf31d66b

    SHA512

    a689f52a3ce3550187a485d3901555642734893947325427e0d18003cb0585c225347540b73161d61ae248acdce35cdf0d2ed4edf32cf505f649df0a24b7b7c3

  • memory/4576-5-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB