Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 04:33

General

  • Target

    ea97a6a532bc926e40f2f1da11fb0fd7_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    ea97a6a532bc926e40f2f1da11fb0fd7

  • SHA1

    4f6ce97f457de83c78956b4d79f80054736415b6

  • SHA256

    fea63acefa5a9667f861330e52a60e93cb8a28878987ef7f4a1a51824d68528a

  • SHA512

    411ef0b3e69c7cb394a2b37676c2b2798be8ff81ddf48599755a0d27fbdf0bd198b9db01b51497d92cd7b6dda2d9497401870ba1e3b1f5b3348c7d0f68bb8a9c

  • SSDEEP

    3072:+eLeUjGXzojTtWC86tTBfK1tXdO/fCccixj/GZ7XmplPSjZpnlJc/Smg1FXtDGwN:0UkzyTs6tTBzDetEmpnncqr1FXtyhq5

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea97a6a532bc926e40f2f1da11fb0fd7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea97a6a532bc926e40f2f1da11fb0fd7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\Temp\QvodSetupPlus3.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\QvodSetupPlus3.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3124
    • C:\Users\Admin\AppData\Local\Temp\Temp\c08.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\c08.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Temp\QvodSetupPlus3.exe

    Filesize

    285KB

    MD5

    d493f86ebc2b7319c4cb28b9a0215a97

    SHA1

    415a94e3063e6f50d4c44a56b21b3884380bf2a8

    SHA256

    bdeb16f75d649bfd70e6f4d08c533b9e2747491013f9c73db08b43817e60387c

    SHA512

    56c0dbeda7c889b5583b65514e8e72f95631d13daffee64a55b8856f3ce653504da1fec691d308c9a4437f3b1460d2f1fcaf6db192cf8b15883ee490caf4dd62

  • C:\Users\Admin\AppData\Local\Temp\Temp\c08.exe

    Filesize

    18KB

    MD5

    e8a1c45a5b5b5fbb4d01e1dab68d7c80

    SHA1

    4df8bd4430914ab21d5f14f596eba3548838a100

    SHA256

    73ded9c348b2fe4fb2c67353cd814004e224ad33782bb8e9d196f830a41cddc8

    SHA512

    9a75fcc78864a59ed8883b0fbfae26a86b6d27de39b05cf3ba8e6a163b9438d07dbcc1899cdc8e4e3acab093291c0bdd11d75077b96f881bbfb1a639777658d3

  • memory/540-21-0x0000000000400000-0x0000000000405AA0-memory.dmp

    Filesize

    22KB

  • memory/540-24-0x0000000000400000-0x0000000000405AA0-memory.dmp

    Filesize

    22KB