Analysis

  • max time kernel
    95s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 12:38

General

  • Target

    e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    e6d6866e90902a708fc0cfea69bd028a

  • SHA1

    47c26e495eefb975f5145c4fe3899588b98c0d63

  • SHA256

    2dcab2ea2abcc183d351c27be4b0c01860ab6a4250c84f76132f348548117766

  • SHA512

    5a2b15cdc979ab16805ef4d143ec8c60416043649c2815adeb1031e62db65233b4c811c1a169138cb27c1cdf8e3e26852c54707af9766931748f481b5ec89632

  • SSDEEP

    24576:pxdC6cVrb8romUZJgWfqedOoqdIjXxQRkF1mpaq8xltMK0MuDwrefAXnYW9iyW:pDC6cb8Cdhq6jXrZxlW0reoXn

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\Winampcrk.exe
      "C:\Users\Admin\AppData\Local\Temp\Winampcrk.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4092
    • C:\Users\Admin\AppData\Local\Temp\MYBOT.exe
      "C:\Users\Admin\AppData\Local\Temp\MYBOT.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • System Location Discovery: System Language Discovery
      PID:1464
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f4 0x340
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MYBOT.exe

    Filesize

    1.4MB

    MD5

    0c3c6747aa1f75ea0b35a76576004f6f

    SHA1

    a96d1617c4586932f9790cf6886dd14cf4541957

    SHA256

    84f4c834069cb14cfe11ec85442386d4c021c51a32ea42ac747420ac5e8d849f

    SHA512

    c00d303d0e83f4f5ad11805bdf66ac363b0561d7948aee16654fca93331e5757e22f653a86830732a32c49d3e8e6f4dcd3fafcd208481fc6e5cf5030239b40b9

  • C:\Users\Admin\AppData\Local\Temp\Winampcrk.exe

    Filesize

    122KB

    MD5

    2765fd619cf31e100c3f28b84b85ba35

    SHA1

    5a6e10edc9b6112964efd2fb45dc05b0f0916269

    SHA256

    6a5027a29992d11566d23ef3ace79d18fa2e0fe1f67a619ab79c4c10f62c7af8

    SHA512

    425d8b7ec804b316c26c677e04797fcc03a19183b7025a8a9df653fb437e1327bb7fd1cb7ee26caf54f5848de2c39b1e92b4bcf51bd958b7557543fb873704dc

  • memory/1464-21-0x0000000002410000-0x00000000024FE000-memory.dmp

    Filesize

    952KB

  • memory/1464-20-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/1464-19-0x0000000000400000-0x00000000007AF000-memory.dmp

    Filesize

    3.7MB

  • memory/1464-22-0x0000000000400000-0x00000000007AF000-memory.dmp

    Filesize

    3.7MB

  • memory/2888-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2888-17-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB