Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 10:01

General

  • Target

    f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe

  • Size

    115KB

  • MD5

    f5c20f991f75fa7aa8e1500b7c5675e9

  • SHA1

    76732f30ee4e8303b3c49412eaf7b7ef8fcf0afc

  • SHA256

    d5e3cd558650601bcd3276f3b430e6ab18f4b559731352d0bc10b0641c73126a

  • SHA512

    3ee5592031b96adb3db69f790830450d200f6ba2818c194f6483cb71723a9b18c0f950ac77ba7fcc268cd4efd884e55425f83f64999e0f39c898d04f4f977cce

  • SSDEEP

    1536:kNTXdukZkJqEtQ75et9DmupKGMR5WWMqCC3WZtfkX6UjbwNVGKJl3WBSACCoOujS:nUkJq99kfUzMqYgIEstWsvHK/nDkQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a22058$$.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1936
  • C:\Windows\Exsprlorer.exe
    "C:\Windows\Exsprlorer.exe" /service
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$$a22058$$.bat

    Filesize

    152B

    MD5

    3b4c5c876cab6dba1fdb464f8b00a39a

    SHA1

    43690a2834a86d76bfeb9c936a5fd87ca69d2086

    SHA256

    11b11bc5f2731c8fdf0ffde24af9a04306104f5a5297ecd1627ae9ffa004ad49

    SHA512

    b4817effad0515cc5ff5336fd83620debdb1c6de51234205aa433b7e02f793d0a3db832907ef757a65e255daba7a837ed75a15da570e3e2121f01615d622ab3d

  • C:\Windows\Exsprlorer.exe

    Filesize

    115KB

    MD5

    f5c20f991f75fa7aa8e1500b7c5675e9

    SHA1

    76732f30ee4e8303b3c49412eaf7b7ef8fcf0afc

    SHA256

    d5e3cd558650601bcd3276f3b430e6ab18f4b559731352d0bc10b0641c73126a

    SHA512

    3ee5592031b96adb3db69f790830450d200f6ba2818c194f6483cb71723a9b18c0f950ac77ba7fcc268cd4efd884e55425f83f64999e0f39c898d04f4f977cce