Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 03:00

General

  • Target

    eef3355677cedcf0b4ddc3a4158e36f2_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    eef3355677cedcf0b4ddc3a4158e36f2

  • SHA1

    46037dcfb9421b611769f2d133f3c69787d18b22

  • SHA256

    977a51ee8ca1bb6b29b806fb210ff63828909fae364e8391be82f5f732e9dd81

  • SHA512

    81dd518d32adb2137a05c0ae17743ce90b8b79a474552730f4ffb05395174a12f3b607b7571b0ce82fa7ba72d71d0c571261646b5a1cdda4fa5132a0301936fd

  • SSDEEP

    3072:SChJgYMm4xf9cU9KQ2BxA59SPMGOorn2C:qYMm4xiWKQ2BiCMi

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eef3355677cedcf0b4ddc3a4158e36f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eef3355677cedcf0b4ddc3a4158e36f2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Program Files (x86)\43156764\jusched.exe
      "C:\Program Files (x86)\43156764\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\43156764\43156764

    Filesize

    17B

    MD5

    89931a70501a3362b6823b53523f5a77

    SHA1

    88c7e199c462ed8cc3af0ba453512b5b1fdcfdb5

    SHA256

    d30d9a0e64bc9f4a306617f087f30de6d57a5413793ab7bde13a299777a1b254

    SHA512

    8fa7ab4824ae86f3f47b3718c11f79ef275dd0639396572eaeb1262ad9153ccf43c633a7b292e30c97370436a09f22fbcf817a802015650ffb1f84d2b83483bd

  • C:\Program Files (x86)\43156764\jusched.exe

    Filesize

    208KB

    MD5

    978a03995b7916dad5c74fa84dae9e23

    SHA1

    093ed2b531f5680ba152953d9a1cc7ac3385cfb9

    SHA256

    5e9411c08bf894222b37b633c8a92687764d03c1af93a261d22f8e1f666d0426

    SHA512

    4bfeefb1bda17ce1ed1ca6cfb340fb2dd8628d600a5a4718adef5d584fe0a46915ee7b6896433dd670251393b2e92e23443a369d514fde35acb20adfd0707eec