Analysis

  • max time kernel
    96s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 10:03

General

  • Target

    00c49ef9496f6dfd437020e7b6cdeb36_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    00c49ef9496f6dfd437020e7b6cdeb36

  • SHA1

    2b0357b75e0563b126428c5c1462b1d45a86afb1

  • SHA256

    155c372ab4f00d3bfcedf2f3f99f80eb386f38de46cad9aac3a060e8e8e0dbef

  • SHA512

    c867eb0abf582ee0629650a2f2b7379a9e2834fe9f27d6f15a6b7807ff1f304c0dfbfa19dae6179444ee8eb0cba592836e545bdcdaf651a843db6320b8817ba3

  • SSDEEP

    6144:EcWMJJhqryYP/daqlzV4GA3Fkk7rzPDCykQSt4lHl+BKg5gFzNemm:EczJJhqrVPldVzA3FB7fPDCykjC3+Ugr

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00c49ef9496f6dfd437020e7b6cdeb36_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00c49ef9496f6dfd437020e7b6cdeb36_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Users\Admin\AppData\Local\Temp\test\test2.exe
      "C:\Users\Admin\AppData\Local\Temp\test\test2.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2460

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\test\test.ini

          Filesize

          37KB

          MD5

          95064df873859405f66a8dab47fd5933

          SHA1

          1e8a0dccae6c1dc0e149581a2dd4a8c79b40831a

          SHA256

          aff909c2d6812ae7eeeb99ef488ff87f6c486cf6d99166908a120bee5652145c

          SHA512

          008066f8eff9b2994233630eebd00c98eebe3c6791147cdb3ddc20ac77980bb73a0f8b3ac5805837cb0f8846f7f6e6d33705e1b45a6bd8ab83ee5f99c913eb4d

        • C:\Users\Admin\AppData\Local\Temp\test\test2.exe

          Filesize

          381KB

          MD5

          378628fa34638d2a8fbaa0b6270c9222

          SHA1

          ced9c9bb220bb22ffde3b4f6e8e901f299cb96e6

          SHA256

          ac2ec49d706608eab153f832c3bf285652377c6fac21b0281548982db1bcdabf

          SHA512

          b6c33a509beebad447f797ce906070ba8434bcee8c1ffe35407b5a2eecd42e47d3e85a24440b7d1109d9e055243523e438133b5562294a63d44e09f1a68a5369