Analysis

  • max time kernel
    121s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 08:12

General

  • Target

    2db48645076f59538f54328edcf6587b_JaffaCakes118.exe

  • Size

    434KB

  • MD5

    2db48645076f59538f54328edcf6587b

  • SHA1

    bcafa7aec034aacc52dfc7227a3a5c5060a55d49

  • SHA256

    032e802224e18781774bc0b22a90dffa707444de1bfd8d89b0874cb8c90dac1e

  • SHA512

    7ec800801ee6413d0d27cebdb2a89f5af77398c419a4dfa5df222be5eeefb23d5cfb68bb95f5f912bced9d08c71b92ed03a26e14c45e3099b6248fe54686c30a

  • SSDEEP

    6144:Gb0muyxIN0CSq4O0WUPgjWrIwmn4SdGrDFKugYjYJDCfA/iXdBbHlRv+Flyg:m0xy+N0CSqNtUDrIdxdwCYjo/EBn+jf

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2db48645076f59538f54328edcf6587b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2db48645076f59538f54328edcf6587b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\WINDOWS\system\services.exe
        C:\WINDOWS\system\services.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4244
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 1.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2344
    • C:\Users\Admin\AppData\Local\Temp\ÊñÃÅСµ±¼Ò1.0.exe
      "C:\Users\Admin\AppData\Local\Temp\ÊñÃÅСµ±¼Ò1.0.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.bat

    Filesize

    129B

    MD5

    aa08456f612cf183111acee888b89794

    SHA1

    1d7ca8d9ba72bd14b036008c82647d224f828a75

    SHA256

    ef35a0b6743ac07993f0baa51d04be03f16eac8fafa9b401768bfed03cfc8e8e

    SHA512

    5d590ce15e15797dec43c6d205fdc207f345bb64b2583dedeb29b97f7cc3433c8e21d6c067573f8185482b0d3846363cbf9e198d43261a879ba7857d45c24824

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    11KB

    MD5

    6a65cc3d735631721fb70331dda8d3c3

    SHA1

    b22ce01f38c2a2383340e58cf67eecee022a6218

    SHA256

    0509cbe7cc7fcbf771cfdb7af29b98e7dd79caad76e48be4e35b98ae9b21a134

    SHA512

    48ade865f14a6eff062ae87fd7398c3f7501c5a687c74660d2266aec41c3d08995bbd4f6de29a7ed9a17e2a31e6fd40904dba66cc59bba56d15b2475781049d4

  • C:\Users\Admin\AppData\Local\Temp\ÊñÃÅСµ±¼Ò1.0.exe

    Filesize

    24KB

    MD5

    2160838bcd691128ffec2d9949050441

    SHA1

    21ec3c9a3bdab7332535844b4d3483985f18cd01

    SHA256

    56566660c12da695585e0c02a0fd90aa5eb210f36e3f473d3bfbf637a0604b5e

    SHA512

    3aec8eeeab1e309233243367e83e25d0132d9bf84c3fd5e261295cfba9f099695f2bc63d5e456bfe7fcf395cb91dfe985fce4f14fe22c540eb537bbdfcfe3ebb

  • memory/324-14-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/324-37-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4244-39-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4356-0-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/4356-24-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB