Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 11:09

General

  • Target

    01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    01021fd92e72a9b06bb95439f3d40046

  • SHA1

    3f74a0c51c1d7b784136ae486256998af2f1d497

  • SHA256

    b457adc2504378f22ad2b25184ef84b892e74e17ff3a9c6917ea658c2070cf66

  • SHA512

    40dd68308d69d4638ed92115905a97f70274ce16728fbf17b62e8bd1fa74727cd756a0023c4ab629b13b8a42c1f834e65b4eaed21fcdbaa113edb5e59f29003c

  • SSDEEP

    1536:RXNzoLxHdAdhK2Y+pe3/lqBmBySysjOKWikWSu:RXpoFC0R+peTjyn4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4600
        • C:\Users\Admin\AppData\Local\Temp\FileTmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FileTmp.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3992

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\FileTmp.exe

            Filesize

            56KB

            MD5

            a5c922729d07527d4f64768cafdb11c5

            SHA1

            ab2c4165c30b8125044b6fe6fb7bce9f9d5cdc44

            SHA256

            a071c7aca096bd114b03fb7fa4bed989aed2d214c8897385f863918f0e6e38c1

            SHA512

            eaa5b970caf99061d8aba44f99c8c2f4cf5df0c6657d2466f5f0a6a5ffd6318c58f07031a119b5046a4c42ef04830386375a464df714365033241e204867915e

          • memory/3608-16-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/3608-17-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

            Filesize

            4KB

          • memory/3992-12-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3992-14-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/3992-20-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/3992-22-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB