Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 01:24

General

  • Target

    db92cadd257d61ec0705c5481be53432_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    db92cadd257d61ec0705c5481be53432

  • SHA1

    d20465e0b61110761a59524edd6021a83f06624c

  • SHA256

    8e7a9f89838c01a9a13b868e34661903a771adce61aca6cdd109239e55ee00ed

  • SHA512

    c1ea7685c1084b55261e08b14b6985dab8aa4112d75af629b0cbd4973ab7e36cd5e0658e60cc0474409c752f6b5831e492d355591cbb98a454e481d6ae775a53

  • SSDEEP

    3072:NYtkwP3n3j4oNx0iJKmmzuVaVvOTwl/lAwSLRjhRx/hru2+44H7PhC6I:NY+wP3nJql/uNRjhR7d+441

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db92cadd257d61ec0705c5481be53432_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db92cadd257d61ec0705c5481be53432_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3676-0-0x0000000001000000-0x000000000103D000-memory.dmp

    Filesize

    244KB

  • memory/3676-2-0x0000000001000000-0x000000000103D000-memory.dmp

    Filesize

    244KB