Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 12:36

General

  • Target

    d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe

  • Size

    162KB

  • MD5

    d65351a2a07e4ab734085105c20499c8

  • SHA1

    c577b752c4075ca9e20d1efb1fd2d852771011dd

  • SHA256

    92037f333c0906022737babdcc34ba19a275de3db6c737c0db429de857ea85ba

  • SHA512

    7c473592a161d133e3da355be743c4c0122b1cdbc82bd608d8f0d9a21cada2d91ab55c7c5e3845964488d0a949f01e47892ba8909e7fcbf91d5483b192184998

  • SSDEEP

    3072:oYfP3qzHxUcp+lH3DZn4UfLufsKa3dOk0X7XpNjAoOpys8cZC39wE:os/q9l+lXDZJfLufs73dOk0XDpNjNOpy

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
      "C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe" ejecuta
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe

    Filesize

    131KB

    MD5

    21ac6a552be4e0afcd2af628780108f0

    SHA1

    a8da5ca19f808666c3ecbcd7175214f07df8544b

    SHA256

    f92101d268f817e892d037eea977651c661eb2e50d7b5a62c4109dc3757b16fa

    SHA512

    85533af7cb7d5a0102125bfc99c9c90a2624da2f7421ddb781afbf0137a866b62bfeedbae2196320c5ca6d3ec71a4bbbbc4997cc69b5f526fd0c7664a848b150

  • C:\Windows\RCXF516.tmp

    Filesize

    21KB

    MD5

    70cb4db66af0f4ee754ffbb92b3fa987

    SHA1

    08c786db5c9507dde8fe4ae32c697622d6031760

    SHA256

    e9f31e20c915a095600590ce76b062cdc35e878ad493eb97f5d6e48a57ebf1b5

    SHA512

    7cc6fc6b9a2c19b33cd1a96603b328315b263460ad6bb8c6a5b2bae9abdb6e0c532b69b4a72dca9e6ae48e18cbecf323f0ff6b555c48705b1b4a11c52c8d4a4a

  • C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe

    Filesize

    162KB

    MD5

    d65351a2a07e4ab734085105c20499c8

    SHA1

    c577b752c4075ca9e20d1efb1fd2d852771011dd

    SHA256

    92037f333c0906022737babdcc34ba19a275de3db6c737c0db429de857ea85ba

    SHA512

    7c473592a161d133e3da355be743c4c0122b1cdbc82bd608d8f0d9a21cada2d91ab55c7c5e3845964488d0a949f01e47892ba8909e7fcbf91d5483b192184998

  • C:\Windows\file0a0.dat

    Filesize

    84B

    MD5

    154f9ce83099aebf20ed0715a692a0fc

    SHA1

    c60a4e6076c1f12ded62960228e96ed17445ec09

    SHA256

    2a93d7519565a4eb79826d69ce8c96194ca36a09e671403d83b2b581da842993

    SHA512

    1a8f19159b29f5bea40ad50159f90c5e7fc3b909ee505a961012d354c9e33d0fee9c6175df3d98c4870e57c796c7f07a814a5e79bd8f4e37af2c143f4525e753

  • C:\Windows\temp022.exe

    Filesize

    36KB

    MD5

    400902aabd2fd5a6cf56186a50e377e1

    SHA1

    05b4ecd58e08de6f65d7cc6e98316ffadb2dffa7

    SHA256

    1cfca96f7dee778fcbbd9c247098d505f4d408621f19c3e5b5c4424834d3c4e7

    SHA512

    ae524cb8b4a1cf62cfe56563711cb802b2fd79d4f58ca0a223d68b48070091853b1c037757012ca66d06d086a09c17c2f4ac8c3b044a06866f31d890ae614d51

  • C:\Windows\temp022.exe

    Filesize

    1.7MB

    MD5

    176cf0c6864b50b52797dc5388825e7d

    SHA1

    82331379c1bf684cee3da790f10be03c001c7de9

    SHA256

    518bcffbbeee1f80943f123f5ab46cd374b428000d7627876c247c20e20d67e8

    SHA512

    ef8e0e84d386e84c1c438556a27b871c63e584c0b1f7f7888ba220332c9ec9d8140b7508950c2defdf43976a1581ec7bc9b59255adc41b6fcc3989591736dd99

  • C:\Windows\temp022.exe

    Filesize

    1.7MB

    MD5

    b6e924917cf1f5b39c7ba0dedaef3cc5

    SHA1

    64298259470a9575e23a538dec67f597a5dfd470

    SHA256

    9dca2dfcd5085060137673ea9398dc0ee03ef7b72f36312605ded49caba71a49

    SHA512

    2e3e7fe461162604dd47662eb7eacb8edc2907464653d4fb687dc294a0fb180fb141ce7861d610995d2b433e274d7b73fc720e2ec99c842355699ad16a2c0b02

  • C:\Windows\temp022.exe

    Filesize

    890KB

    MD5

    3b65c3b538f4e529d6cf0eda4fe7df47

    SHA1

    db965ca1a5b373b4c85287d6150196b4a0915ab6

    SHA256

    ff945bc21fc5c5b2e235fd0c916e337fad97fc32b4612aa2b1c3bc06e9a66de1

    SHA512

    07929eb3fe7d738b517b27c4625a4f8ce6e5f6f9e9ea276e02ba7872f9e77fb6d9fded1934d205ed01d37fe1049416214d1148bcb8bad01cd038df7e4bff90ae

  • C:\Windows\temp022.exe

    Filesize

    84KB

    MD5

    12996dcfe8f3e8d9a56017a43d01c1d7

    SHA1

    2724e3a23a35d0f9f2e095a7b3b77dc244984442

    SHA256

    a7b110f50ffcdfcfae7538e85cb7f9dc7b101aa7bf24113bb01bd1322b1cb946

    SHA512

    9bf88cd85ca7e6fcdbe1d062e0a4c74b86745112ccc0bf243812085b427d7dd705a46a678fe8ab8b080be313af0e35b742f524e5e2cfbd7be2207ee3d23ebfc9

  • C:\Windows\temp022.exe

    Filesize

    102KB

    MD5

    9af37762c338c80c4e042a6c41c6455c

    SHA1

    7e1ca89e5a7e4ff900b8c2bd34560c2fe2a0e645

    SHA256

    e01b104e3585d031294ab6a46b0f64d95944dfbbc8d2dee871b96bef3712d634

    SHA512

    fadaf65e96f354f9ec1feb1fb11d32efd043cdece44f27990c369ebe140b83d6a8794351900a28e6b5100c4c54f2cf24cdf99d1f66c06752880b47aae94de6e2

  • C:\Windows\temp022.exe

    Filesize

    209KB

    MD5

    4ab594afb5ef76a191dbd2d21c59b10f

    SHA1

    99a2bc82824aabc65c257455455ec9ed2b4ba6a9

    SHA256

    a1588adcc4f27aa1d6344f1f0b9bc0cfb7645d9a6e9d17d295565e3219cbefa9

    SHA512

    a6fd3b2c21f685ff64c8a7760c9d153540f1cc8dfc0f8ae29abe4ddb132fd98f9b2890e2866b852419c00b6c353f0266da3f2f8ba7bc5611206db42b1fcbd27b

  • C:\Windows\temp022.exe

    Filesize

    30KB

    MD5

    c59bdb3a888ace35b61d699951a66b58

    SHA1

    3f4c6ae7291a5d62c874ee07cc66d340ef4effb1

    SHA256

    8efe32fc71a82e1229cf123730da86a802837cf6c47baf5278c37fa0db865f3e

    SHA512

    6283a3b4f32d57f88288be5be149d8890db20da4717687101713482970028064ade07d26e42453ddd0fa133c9763eb841ebb9824330e5842289b7680c1249183

  • memory/220-17-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/220-16-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/220-462-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/884-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB