Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 11:49

General

  • Target

    012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe

  • Size

    408KB

  • MD5

    012956475b26cbdf95e0c37fb49df4b5

  • SHA1

    495780916fd0cf2d293ae78931b942e99edfc5e9

  • SHA256

    5a2404f77f0bc03e7b0881c1e44361ca04d3790d30663211c371ad808a49098a

  • SHA512

    ba01c3f12d3b1e8accdb8acf123be80ac5db88b8718a34e7e226dc92df16b27c711e320ad08fd1d144b38b1bbdee405fd41dd21f1dd2c20d3a6e74736addedc8

  • SSDEEP

    12288:hw7GJF+yDSO+2Rz8++HxBETNUCUeQozxfcI:Wy5WJ/0zZcI

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe"
        2⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\SERVER.EXE
          "C:\Windows\SERVER.EXE"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SERVER.EXE

      Filesize

      28KB

      MD5

      8fbc616195317fe76e9830ef73649e46

      SHA1

      a20e6898fe63a88dab5f4de21b4cf17405b90147

      SHA256

      8eaca2d838cf928fdf33a322750c0d2a545f022a71138ad9f256d57993390fb0

      SHA512

      227f713e7e83eb9634c8940ed9a8e4af00c31415a7c42784afecf81aeb50edf9b5165726df085481caf78cadf411f47fb866eb5144c8a9dbdb82167484a4fd06

    • memory/2164-0-0x0000000000400000-0x00000000007E6000-memory.dmp

      Filesize

      3.9MB

    • memory/2164-1-0x0000000002810000-0x0000000002900000-memory.dmp

      Filesize

      960KB

    • memory/2164-16-0x0000000002810000-0x0000000002900000-memory.dmp

      Filesize

      960KB

    • memory/2164-15-0x0000000000400000-0x00000000007E6000-memory.dmp

      Filesize

      3.9MB

    • memory/3472-13-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/3472-18-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

      Filesize

      24KB

    • memory/4932-10-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4932-14-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/4932-24-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB