Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 01:47

General

  • Target

    0851214338908a19195bca629ab00228_JaffaCakes118.exe

  • Size

    212KB

  • MD5

    0851214338908a19195bca629ab00228

  • SHA1

    804648ef016a3f0fb889228a70bcb78189a59d1c

  • SHA256

    d3cf19c097334f7138630e2fe06585b80b25e5867e77e84415f01f0f411a796e

  • SHA512

    3bd1e73dc52f66dd6f6fd56ba26fbd65d7c762a2ed1491532299d03fb2cce5ab73fadf826f46d41f8c08eb568d61b94fa1b3a9e8bba062a8a6c19be0d0891794

  • SSDEEP

    6144:otqKopK4ivSq8Kweo5htrb5AcSli0JQVZkiWTfh:G4pKFKLfftnCTQVKiW

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0851214338908a19195bca629ab00228_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0851214338908a19195bca629ab00228_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s C:\Windows\system32\radmin.reg
      2⤵
      • Modifies firewall policy service
      • System Location Discovery: System Language Discovery
      • Runs .reg file with regedit
      PID:3928
    • C:\Windows\SysWOW64\systemram.exe
      C:\Windows\system32\systemram.exe /install /silence
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1188
    • C:\Windows\SysWOW64\systemram.exe
      C:\Windows\system32\systemram.exe /start
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3080
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c clear.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1476
  • C:\Windows\SysWOW64\systemram.exe
    "C:\Windows\SysWOW64\systemram.exe" /service
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:1380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\clear.bat

    Filesize

    116B

    MD5

    030679d31b62e3182c0ae8e27c24097d

    SHA1

    58620fd4d156b7cc3f9b4c988507abb113096dd4

    SHA256

    df2bd9f5578cb738fe3b7f279a752451238be821a5d7d1267e8b802a60fe7858

    SHA512

    d751a77a7b0943ca68729142de04210abb3696707df7758aa2a8a69d6efa795cced340aaf6dcf0b24d03f6de1246a251be8b96fa59da6bf0d09378a0d0c20359

  • C:\Windows\SysWOW64\Systemram.exe

    Filesize

    189KB

    MD5

    2e65fe5796600e8203030026a861273d

    SHA1

    81f91f591b597aa4a4c61b0d21f6fcd806edb5ba

    SHA256

    b2ec88e4c0dbd531c84fe68507bf8bb8c90314075923428efcc81f9881a834fc

    SHA512

    a51674c01a6604dc4db4b6754bd28c08e4a58348def20190352b92cb134648b2924927affd7ca77be93e116aa614e1794b4403b484b27a7eede6c6ac01fdf04f

  • C:\Windows\SysWOW64\radmin.reg

    Filesize

    617B

    MD5

    cde89edf854d3c3efe11322e9d1dc5fe

    SHA1

    59014d33f373d79fd723bcc9cd67d85260d599b9

    SHA256

    c8b8f692b654de13f1f8b2f2044918caf7b66729d50a203cb8c5b093bdee76fc

    SHA512

    4d253aa485f1fc7c5eb6e35ba7c36b51e2bc2b93c3e82099fa68ec54a0640b1e1688dfa4817c22997f06fa47154ce5c292d610d89c54f150453390071bcb9d15

  • memory/1188-10-0x0000000001400000-0x000000000148F000-memory.dmp

    Filesize

    572KB

  • memory/1188-8-0x0000000000D30000-0x0000000000D9E000-memory.dmp

    Filesize

    440KB

  • memory/1188-11-0x0000000000D30000-0x0000000000D9E000-memory.dmp

    Filesize

    440KB

  • memory/1188-7-0x0000000001400000-0x000000000148F000-memory.dmp

    Filesize

    572KB

  • memory/1380-15-0x0000000000DB0000-0x0000000000E1E000-memory.dmp

    Filesize

    440KB

  • memory/1380-23-0x0000000001400000-0x000000000148F000-memory.dmp

    Filesize

    572KB

  • memory/1380-25-0x0000000000DB0000-0x0000000000E1E000-memory.dmp

    Filesize

    440KB

  • memory/3080-13-0x0000000000B90000-0x0000000000BFE000-memory.dmp

    Filesize

    440KB

  • memory/3080-19-0x0000000000B90000-0x0000000000BFE000-memory.dmp

    Filesize

    440KB

  • memory/3080-17-0x0000000001400000-0x000000000148F000-memory.dmp

    Filesize

    572KB

  • memory/3152-0-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3152-21-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB