Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 20:32

General

  • Target

    fd16fe962e259fecb66331ad6cddd5e7_JaffaCakes118.exe

  • Size

    459KB

  • MD5

    fd16fe962e259fecb66331ad6cddd5e7

  • SHA1

    05e5999748a8b1b808ca5e9d7d5449e9170bbe63

  • SHA256

    96cd62da49afa2b50fa78554601cfdc53dc2783f728f554b3ba9338cf944c26b

  • SHA512

    ea3cc5f271dbd166cf4fc492af95847a3360c1c162aeff45c2c7c3f5dc59d0655a80dbe3651f1e52e4d118415adc468c25a5784d473de05c8e54cc62a7b29a74

  • SSDEEP

    12288:SDrgl1m8D/1xtMltyGNdV0LStDrNpQuy9:SDrs1r/1xuP/NACDrNSz

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd16fe962e259fecb66331ad6cddd5e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd16fe962e259fecb66331ad6cddd5e7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4592
    • C:\Users\Admin\AppData\Local\Temp\calcolatricevoce.exe
      "C:\Users\Admin\AppData\Local\Temp\calcolatricevoce.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1056
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3776,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:8
    1⤵
      PID:2372

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\calcolatricevoce.exe

            Filesize

            555KB

            MD5

            066bd64a8df795af7395510c1ca6e50b

            SHA1

            87081c42d08d373d70424b8856f9d1f838c69bf0

            SHA256

            1839afc2a73e1f82f788730dc5041c064669488328075731dc141eff4e982d7d

            SHA512

            992123dfd5dcb19f402a54ee7869b780b1e37bcfe4903c26121a060ac493956549a5337b0d3d3c0add905962642867b43cab29cd382f235cce3d63234e55b750

          • C:\Users\Admin\AppData\Local\Temp\server.exe

            Filesize

            154KB

            MD5

            3c6e84717acc15a12394578a31f01461

            SHA1

            6d667fa6572d5bf7ad2c9d3591e32f7eb4e0c2d1

            SHA256

            ef34609bc4e2bba0e7b7eaa04c11da1551a4494a13fc22c1edd45bad2cbd8e6f

            SHA512

            952543b1cbd89a1fb46f995cd148c57d86c67e3d9146f9c6c9b843ec5e047ffedfe1bb71f0da85195a1eaea3681ecddb3290e6b6bc3756e8998732468fa77a42

          • memory/4592-28-0x0000000000D70000-0x0000000000D78000-memory.dmp

            Filesize

            32KB

          • memory/4592-29-0x000000001C030000-0x000000001C07C000-memory.dmp

            Filesize

            304KB

          • memory/4592-24-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-25-0x000000001BA30000-0x000000001BEFE000-memory.dmp

            Filesize

            4.8MB

          • memory/4592-26-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-27-0x000000001BF00000-0x000000001BF9C000-memory.dmp

            Filesize

            624KB

          • memory/4592-22-0x00007FFE966C5000-0x00007FFE966C6000-memory.dmp

            Filesize

            4KB

          • memory/4592-23-0x000000001B4B0000-0x000000001B556000-memory.dmp

            Filesize

            664KB

          • memory/4592-30-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-31-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-32-0x00007FFE966C5000-0x00007FFE966C6000-memory.dmp

            Filesize

            4KB

          • memory/4592-33-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-34-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-35-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4592-36-0x00007FFE96410000-0x00007FFE96DB1000-memory.dmp

            Filesize

            9.6MB