Analysis

  • max time kernel
    93s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 06:04

General

  • Target

    2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe

  • Size

    159KB

  • MD5

    2c2aaba01dd4eee1b0e89043858e67ed

  • SHA1

    b20d5d5f363b33bbd979bcd16fdf9e00dc9977b6

  • SHA256

    ddd2a720c2589c503776c0248a79eda2738fef749aa4759ee55b12a36bdc577c

  • SHA512

    426f7690771618de6280c23ba8dc48e4e7c901cf78c79e5c140b5e34fb88894f9c9aaf3fba10bb840e4a4e1a15bd254ef7eacff55a1a7409a3951770774e557b

  • SSDEEP

    3072:X22ihA0m3BJf0AIGSYoQAL8zNZE/CyHhdjNRczbMTMzbZ9CA:oA0m3T0AITYoQrhZEqyzZGHMGb5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\biclient.exe
      "C:\Users\Admin\AppData\Local\Temp\biclient.exe" /initurl http://bi.bisrv.com/:affid:/:sid:/:uid:? /affid "ffonts" /id "adventxomx" /name "ADVENT" /uniqid 2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biclient.exe

    Filesize

    219KB

    MD5

    c66293ccd7cbe84b1b8f393ca5e4e6d7

    SHA1

    c24089d407e6280b79bec86532e9de0118e4de71

    SHA256

    ffbae29e2f233767fd42909720497165ce3552427ef93efb2fc714fb4204755f

    SHA512

    7ff97aa71f182035f90ba10c3bf8087280e3f34bf717bda139d642f4e043c64aa2b98d82a90a32f1df4b76f9d7610af62390fe934e514c90c703381a421c00b7

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    79B

    MD5

    3448a36fc857f6b3dc1ff89ef61eb6c9

    SHA1

    0effdb4e517257be9f07319f62191b7ccfcc9be7

    SHA256

    82e3e35966a1b929e4956e40be92ad17db7c58f5d548f4d007ca17ab9f11a3c7

    SHA512

    e6cc624ffc3dd9a1c73fd80a78932be5af5e33eb5cc7895aea68c0634fa72996b057b39fb3291febbf7ac6ca68376504db62ed35a88b6c56c0308ce45b67a05e

  • memory/1020-14-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4992-15-0x00000000011C0000-0x00000000011C1000-memory.dmp

    Filesize

    4KB

  • memory/4992-76-0x00000000011C0000-0x00000000011C1000-memory.dmp

    Filesize

    4KB