Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:50

General

  • Target

    ea883c3670300ca06174297ce5cf535d_JaffaCakes118.exe

  • Size

    532KB

  • MD5

    ea883c3670300ca06174297ce5cf535d

  • SHA1

    eb582532382834785e698485a5c0ad252abfb8c1

  • SHA256

    103af9ea263cbf35fdabbd415b8fbb564c978f9854cd7f9cc226655c6b699c86

  • SHA512

    8bef9c5b3eefd21229b601895f7e3397804ee1a844820590727813a162a701baf31122b4abdf00ea0925416868560928ea6a4c3b5a89f47f4aa215a3026eb02d

  • SSDEEP

    12288:tXf2DMo6GCfdog22HXrFy+344+E9OsDYMbWMKyH/rexOww9G:tv2DBCVx5y+3RxDYv9UCxOwws

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea883c3670300ca06174297ce5cf535d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea883c3670300ca06174297ce5cf535d_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Users\Admin\AppData\Local\Temp\n6472\s6472.exe
      "C:\Users\Admin\AppData\Local\Temp\n6472\s6472.exe" 57fb07727671d60ac1097771L6ml3ecgWr1JJwZKuxf55b0AEk7wDS69xM4BG5HlmxYHuvObkPrVtQTGkgcpxUmjksMCMBgdCLWo5E/cthJ3wldgTPr1H5AJCIUDgyYCQsVXDaTPZm8d7Xcft02f2HtYOjwtOSMqdzliFFeUIFpWSbI= /v "C:\Users\Admin\AppData\Local\Temp\ea883c3670300ca06174297ce5cf535d_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n6472\s6472.exe

    Filesize

    219KB

    MD5

    94a69394c365d4216dc0a267d585d13f

    SHA1

    f832d782b12836fe6ad436dfac3d97f91b1c5ebc

    SHA256

    8dafaae263c44624342156f43df4bbe158702ac7bc750c4089838f45f75829a5

    SHA512

    5daafac615d6a3b269717459524c70634976f310ca6c2d1f7f16040fa9948b7abec7f781330b9794c1f888eea4f609c4a50ec8f0987feddca2865796d2ea6ca2

  • memory/2148-12-0x00007FF8DC4E5000-0x00007FF8DC4E6000-memory.dmp

    Filesize

    4KB

  • memory/2148-13-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-31-0x00007FF8DC4E5000-0x00007FF8DC4E6000-memory.dmp

    Filesize

    4KB

  • memory/2148-32-0x000000001CDF0000-0x000000001D2BE000-memory.dmp

    Filesize

    4.8MB

  • memory/2148-33-0x000000001C800000-0x000000001C89C000-memory.dmp

    Filesize

    624KB

  • memory/2148-34-0x000000001D3B0000-0x000000001D412000-memory.dmp

    Filesize

    392KB

  • memory/2148-35-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-36-0x00000000019D0000-0x00000000019D8000-memory.dmp

    Filesize

    32KB

  • memory/2148-37-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-38-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-39-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-40-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-41-0x0000000020FA0000-0x00000000214AE000-memory.dmp

    Filesize

    5.1MB

  • memory/2148-42-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2148-44-0x00007FF8DC230000-0x00007FF8DCBD1000-memory.dmp

    Filesize

    9.6MB