Analysis

  • max time kernel
    94s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 19:42

General

  • Target

    e9d964dc02ac40d6f684e6c7c4fa9929_JaffaCakes118.exe

  • Size

    216KB

  • MD5

    e9d964dc02ac40d6f684e6c7c4fa9929

  • SHA1

    2a8b32412763d9b56bea830cdfff0f3f0d84849a

  • SHA256

    4f12e093da5a3cdf5a433a3b2cca2511e0c9a1bb2bc19669d46fcd1ec3680e87

  • SHA512

    a541c4f11bf6826e1fdb08e9f5608781139aeea3c7c5c1112972a391673aac1310d58ba874b6ddd1ea872edf38d519b8c009f606ac1f8bfa7d335a8d44f31283

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8Fp4tkaDpju:o68i3odBiTl2+TCU/mtkeu

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9d964dc02ac40d6f684e6c7c4fa9929_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9d964dc02ac40d6f684e6c7c4fa9929_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3204

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\bugMAKER.bat

          Filesize

          90B

          MD5

          4914b4628bd5fd4a493dc08c20d79af8

          SHA1

          6a5e964038a7d4e5f4378914fbf4d5f1de68da8e

          SHA256

          b4fdd79d7bee6f7a673ff9f32fb0578ad8df4a9237a974709745883c9b659ac2

          SHA512

          e9e7a58ba08d3c3d05cd7f34f8e94f405ad58519b5049c9854aacb75375c5af616b23fc7352cb881e3cafb7215b892962c3b4421c95716c351f2ded120b6da1b

        • memory/3608-24-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB