Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:39

General

  • Target

    ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    ea840b610aa1636621be214c6502d3a0

  • SHA1

    106e244a768c44f29c336d9390b2c2c55e8f9c9b

  • SHA256

    b035879968ec12f8e53cc472eed90a5e9200c0b08cbc2362eee9867903ade086

  • SHA512

    269a69123bbdeeae26b655f1ae81e22e0e57cb7ef7e8adfd22daf20ae070c5d1e2f5e15a58f8ed512bc73d1a63762ef0350a99aa887dafcc12bcc8b870941fd8

  • SSDEEP

    3072:t2hCMZRDoMZyQmELk/TlkOwyYElrn/gmw4/SeHnkyHTjFaGYO:taP3D1Zy5nZnlrn/bw4/SeHntHTjN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c start C:\Windows\Easypic.bmp
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Windows\SysWOW64\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Windows\Easypic.bmp"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3224
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Easypic.bmp

      Filesize

      703KB

      MD5

      ba38e31937cb8a34d2b91f53c308e5e1

      SHA1

      f8a8426a7afc4d73cb74b35b0804e23db053e309

      SHA256

      dbae1c247f764484a4bcbe60010caff85bab2fea4f469dc01da550fa26d3d313

      SHA512

      5d6b57314774a5d74ea3a0a2eec05d57a830a43fc4c19ad8d287f03d96f9f10cd865e17300db451d6711eb471fd9a8476785ad15b030b6533488aba1d84e95de