Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 08:59

General

  • Target

    007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe

  • Size

    98KB

  • MD5

    007d77752a0c281ca7421db22d2f393a

  • SHA1

    f2c0755be54da11f37f2a4b10a3b82233e6a08f4

  • SHA256

    f6fb0b9735cf5b15117c63772451a8c3334684c9748b55231c4148f37d0d9724

  • SHA512

    2afca2ea648f42530681b458472b01e96f908b27a03403133e00c04208c7b293ac989bbcd0f59813f0c9c3f686640e756b6f502a295f72f2afe9941f2da531e9

  • SSDEEP

    1536:OdSW3HA5cb5mM+sPbi3EoGDoj4LhaMB0nuuLpb9oTMz2vhEFqwi:BeHUcbWsPbi3jBjwhJB0VLpbiAz2vwX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rmrf4785.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\SysWOW64\PING.EXE
        ping 0.0.0.0
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rmrf4785.bat

    Filesize

    253B

    MD5

    1f2803ae80a4b00d7ea08c298fd305ee

    SHA1

    a7b401eaf7a6fa526eec301f37875a7ec84deda1

    SHA256

    5b8a2da14bf4f3aeea196ec041a380410ccab49cb651e11cc0af25cc5945a937

    SHA512

    238fd293abc700b88038d83e74b0a509f03e96cab113baad709db85b02eb4f713b23a9a60977dcf6b70e87d82a408a8521e602b24914c1991555ceca9bc33310

  • memory/3200-0-0x0000000000401000-0x0000000000405000-memory.dmp

    Filesize

    16KB

  • memory/3200-1-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/3200-2-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/3200-8-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/3200-7-0x0000000000401000-0x0000000000405000-memory.dmp

    Filesize

    16KB