Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 03:56

General

  • Target

    161090ebde55e92b33150f057f9ef1bd_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    161090ebde55e92b33150f057f9ef1bd

  • SHA1

    aaedec30d827ebe2b2f5401948c2ffd1d8de4358

  • SHA256

    808f733a907ab01a52fc32956b67819c8f5a081174f7785f8bd25ce14af23fce

  • SHA512

    ecd8b098557f1ed210a28b78ef1448a0e2fcbbac33179037ba8e60b98e1c603361f493a2aa54a3453bc9fcee41cf834777c1c50d3b66646ac62604d63d7ce003

  • SSDEEP

    768:3MPTxLgx8EKs+i9xWElGGeaFlJsD+jzke5fvFfiafbALro2Oz:30Lvs+iVqGJi+Xk6PzALroX

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\161090ebde55e92b33150f057f9ef1bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\161090ebde55e92b33150f057f9ef1bd_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\SysWOW64\reg.exe
      reg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{0B621C06-12F5-2E37-6821-7FD2C0C0CD13}" /f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4800
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\161090~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2924-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2924-4-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB