Analysis

  • max time kernel
    127s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 09:34

General

  • Target

    ed4f086cec6ebcca17add47eee7c68ce_JaffaCakes118.exe

  • Size

    236KB

  • MD5

    ed4f086cec6ebcca17add47eee7c68ce

  • SHA1

    9e09812c7a6461488275805bfa67c095d68af561

  • SHA256

    ae2c55d97db902836aa071e9730107d63442618abf55e1788fb03d62f3e1b111

  • SHA512

    82ecbc827138bd4561971eab87cd9a4735d7858c8c754ee2c9153c17092124732a15f4a23f38b28fd4420437b0a2f572acfbfbc38e181f58c466bc3d6fd4e685

  • SSDEEP

    3072:UVHgCc4xGvbwcU9KQ2BBAHmaPxlVoIb5ERvi5PZGU:BCc4xGxWKQ2Bonx9P3

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed4f086cec6ebcca17add47eee7c68ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed4f086cec6ebcca17add47eee7c68ce_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\4ff9ba99\jusched.exe
      "C:\Program Files (x86)\4ff9ba99\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\4ff9ba99\4ff9ba99

    Filesize

    17B

    MD5

    134c1d489094d6d3399f65b0e9aebc1f

    SHA1

    612a57fbe6ed3ab9c15b39451171d813314a28d5

    SHA256

    54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

    SHA512

    b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

  • C:\Program Files (x86)\4ff9ba99\jusched.exe

    Filesize

    236KB

    MD5

    e29260e25a6e1e0a1c907d74ccd6652b

    SHA1

    9121e0d89068a97363e4100f6a4f88f7a2ef3ce2

    SHA256

    dae5ffa01fc1d675fa03bff0c34444218925026ac9bb0fd20729ec61dcbd462f

    SHA512

    19763d383292ab413f7ce1bce6dbd3b3bf3023cafa12d9e3eca4a809cf698536663e9569ec669826bc43fc864e5ec8f225fd60574f8f1b57a3732a82b2b119ad

  • memory/1924-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1924-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3340-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3340-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB