Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 13:58

General

  • Target

    d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe

  • Size

    446KB

  • MD5

    d675558df7f74915386f10a9a941c7ed

  • SHA1

    be898ec4f95d007f6418ca1b1fb3abbf3698b621

  • SHA256

    cfe5894d25a1c5403f7fe1de9af32dcb83a37f52e91b048150b0e68f1dd15ca2

  • SHA512

    b4ef98cae99d68d76ea1c58bcbbfe2f25372a20f412149d933be36db974a451fa1d58f090e4be873c3230c19434ac01be8f3bd1e66ef0b6eca63cfe71358ad3b

  • SSDEEP

    6144:sNXDAotTVxeZbgrzV2GSzc9m/eOLYvWE4x+dj9oMlez8l0NaGOeX+FSkmL84++Js:8DAo5VxNrB2ZcecX1l05+FZmw4S1

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:348
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\load.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3544
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s svchost.reg
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\svchost.reg

    Filesize

    129B

    MD5

    059368abd45a349b64d9dd97b9a424d5

    SHA1

    3dcb14033014eec8acb86601d02706904d1dc3e3

    SHA256

    b13d68ed18930c6a3536aebd826b92d9dd90c27d6353bc0a33bed655e746040d

    SHA512

    4557cdd2c8080695b9e273181b713a7843dd523c2681084323e042a8e0f651f84ea3070b47c7161d169c0968586dfa089a9fe2c14cc3fc7d42f9a363b8a988ec

  • C:\load.bat

    Filesize

    717B

    MD5

    9821c22158bb5fea24f3e133466f640c

    SHA1

    615701ee34403d8ec58dc32adbcf5655cf671f29

    SHA256

    fdb3639edfdcb47f4d9a967c732fe00f0961930f797107fa521012d256fff20f

    SHA512

    3a0dc6d2dd7dbf620eb6b3f49300908d10bb7822a04400ce5ec268609ab24156c18d0b627fa900f7e42707012c2e1f405625c92d23a2f8b3716d3aa0f76fb741

  • memory/348-0-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/348-16-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/348-15-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB