Analysis

  • max time kernel
    94s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 03:20

General

  • Target

    fb66fcee79fd0c4cc2dbe887b98bcda2_JaffaCakes118.exe

  • Size

    287KB

  • MD5

    fb66fcee79fd0c4cc2dbe887b98bcda2

  • SHA1

    740ebc60176513a1e1a614d5ba7824d7fc7ae0cb

  • SHA256

    0b75f331290973cdd4191225d46e064a84c42f58a71030669a2a65f364ff2317

  • SHA512

    29079a8097f698035323f989df918e2b68fa2cfcad76131c1945b4126d3cb92032c3707efc7849c3c86a6e7f6275320603c6f75a869d4036da4294b702b31ec8

  • SSDEEP

    6144:zxddq5R7YJZNLqKvDd5M5X6BfnkZ5vkNS9jMl:zZq5R7KNuCY5KBf8xkNl

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb66fcee79fd0c4cc2dbe887b98bcda2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb66fcee79fd0c4cc2dbe887b98bcda2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DeleteMyself.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\SysWOW64\cscript.exe
        cscript //nologo C:\Users\Admin\AppData\Local\Temp\tmp$$$.vbs
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DeleteMyself.cmd

    Filesize

    291B

    MD5

    668c3239949f7a97bb5a73c5c03c6bea

    SHA1

    fe77b4f6b1353e0ab343172f7cc4e634d091284c

    SHA256

    9c36f01c130f9a375c2eec106cf889fbdc4698880cfa1fcae90e79cdd990b790

    SHA512

    1d8e7f05fdb516cc4dfd196afc5a8d2f00fd81958810dfbcc75a5d7805fb4eea15106bf98ac9336af4af8d9492d0a9f823f19c756c928a17a18df64d62fc394e

  • C:\Users\Admin\AppData\Local\Temp\tmp$$$.vbs

    Filesize

    23B

    MD5

    1f213db973e60e54a1200d443819b5b6

    SHA1

    ac6eed8fdefe0d1a997a11e7968c81988b5e53f5

    SHA256

    d414dff074733c8f4e463e0d9bcf219058d56e1e64b4a3984e1f36ab01966d59

    SHA512

    ab045bf7bd654e135b8697dadbb48c8146d7fab9f168d6d550b7f5dea76b4724ae2a6876b343efdc42aba9b010a331b3c3791985de3cb836f28bea36bb54f7bf