Analysis

  • max time kernel
    93s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 13:08

General

  • Target

    017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    017df3e1fbf3077b4ecc3505f978fc29

  • SHA1

    00a273aaa0354b8240225d6d754cb90d087e3a28

  • SHA256

    d40c6e1a46ec1bf164b884997375f0ba3d0e19032995b6b0f7871435157547aa

  • SHA512

    2f8749281fdd965be405a20909a5c8f85cb2b3b1b8feaa6db1c6bf47284ca82a4d55e074c253d889446160f021683fe0786a34f7714dd57e0c5abc378c015ce4

  • SSDEEP

    1536:LA1rTrb0ZanRg/XdcUkUTKXSSeqJFaoVLGX1Gw4AfZksczp2038:LAd3gcnStcZU2RnJozdpu3zpM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\017df3e1fbf3077b4ecc3505f978fc29_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Krf..bat" > nul 2> nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Krf..bat

          Filesize

          238B

          MD5

          8623107e0d264c29304e03b2446c6ec5

          SHA1

          da1cb5d6065253f2d6ac32ca89158fe770bc3b6c

          SHA256

          6fc3f057eaee05f0a9e7bd158c216d92bededa31c717860eaf24acb31f850aec

          SHA512

          bf27d7d986d469cb028e6c7bd47dee53febe97da10ccfe782979ce17e786041db2350125c92c6ccd44ca625b1f7c3bd74ce2fa2de67fcd9a528b3b8d373c3c46

        • memory/2044-0-0x0000000002160000-0x0000000002168000-memory.dmp

          Filesize

          32KB

        • memory/2044-1-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2044-4-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB