Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 15:07

General

  • Target

    0f4d51aa78e3fcb5a43fea7f5b515b00_JaffaCakes118.exe

  • Size

    220KB

  • MD5

    0f4d51aa78e3fcb5a43fea7f5b515b00

  • SHA1

    ce38c0fdc1aa03d142f7e8862c1375e4dd2964c9

  • SHA256

    6ed1218e53f9915dc4fe20aebceffbf2527f5135d1e69cbeaff76390a99e2cff

  • SHA512

    2e280d2e6afa106131b4163a01d8fc37733ca67fde0224071931e0861b7ac729e8fac11c131cbc251bed4cc9ce7314d0950edd8a4697abee8850aeea248c2da9

  • SSDEEP

    6144:HJL3tUPwP1HbRM8ZcgGGughEP291LJq8M5Km3fIs:pBUPwkkTGGughEOo8MXAs

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4d51aa78e3fcb5a43fea7f5b515b00_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4d51aa78e3fcb5a43fea7f5b515b00_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\dplaysvr.exe
      "C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\0f4d51aa78e3fcb5a43fea7f5b515b00_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2872
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B21A.tmp

    Filesize

    98KB

    MD5

    52bef2f69d26f8c6cad4a0c0af8d4e56

    SHA1

    28ef413f9e68e75d5c9f59d806732290b55a083e

    SHA256

    be021a8e11f156e04cf2efcf29b56131a02f2d9fc1018f2a4979a7a656741cc2

    SHA512

    a5591b821406257d9d65604237247dade2dd17b554b4e4f6807d7252094b8c4dd4efa795455ddb673d0135d75895bfcf6a8c7e1e130bb8b30e16f7b571b9b980

  • C:\Users\Admin\AppData\Local\Temp\B21B.tmp

    Filesize

    45KB

    MD5

    c9d1b8d8a89d27dfa041d0a0eaeef185

    SHA1

    7c6d7d615537ec4887861fcc37475b8105b51fad

    SHA256

    9d4472bb46c5c1def700e6a2145b6008483aa8ae182d9d795ebf133469e4a43e

    SHA512

    89ed44bde5af501ddd81f17e0f7efce9897d3b6fc5a5c2c328cc88a6d8e68a87870e773ab5cf7239db50cfb6ea8951b942a2fbae7100eadd4a05588100e8c7f2

  • C:\Users\Admin\AppData\Local\Temp\B21D.tmp

    Filesize

    882B

    MD5

    d9dc78b1be3d670726c00679c7f3b14b

    SHA1

    b269e7e97ea12365a39a3037b9e7c7561019d0ff

    SHA256

    5fdd84fdbb9a3cbd2e70232d0c8d8ecbe9b25dabafbaa48a341c27b01057f041

    SHA512

    89e00860d64bd21ba33985087a1fdde2f33e762fd5eecf812e68d45a9f81e36a7d6cafabc0a4aac4d48abe32e64bc12cb45f6f10bcf44ff9c2beaedb51a20681

  • memory/2732-25-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2732-2-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2732-1-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2732-52-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2732-0-0x0000000002080000-0x00000000020B1000-memory.dmp

    Filesize

    196KB

  • memory/2732-26-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2732-24-0x0000000002080000-0x00000000020B1000-memory.dmp

    Filesize

    196KB

  • memory/2872-34-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-44-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-28-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-30-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-29-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-37-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-36-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2872-38-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-23-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-33-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2872-39-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-40-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-41-0x0000000002110000-0x0000000002118000-memory.dmp

    Filesize

    32KB

  • memory/2872-21-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-42-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-45-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-43-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-50-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-51-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-22-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-54-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-55-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-56-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-57-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-58-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-59-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-60-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2872-61-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB