Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 13:00

General

  • Target

    3a263e37a9c4c62f0174069fa483ee9e_JaffaCakes118.exe

  • Size

    37KB

  • MD5

    3a263e37a9c4c62f0174069fa483ee9e

  • SHA1

    6255a95b31f782ddc4493dd1302a6516c259dd86

  • SHA256

    cdbe761e9393b32524dcc363f024dd02d3d83284843e02604d75f682e284fe5d

  • SHA512

    dfbd1a5403170db118d4dc176aeffe6d1c86b1fcf230fadea3966a9bd36e7fe8b06e8e9a804316fb196d026f5a6e919f18987747b975195dbe327132e2e7007e

  • SSDEEP

    768:FVzEq+aJe1mgawzxsUNCub8PC1jIHxATVGuQy5Mz6QCXPX+NtlEcz:FR1+aJe1mgawzxsBub8PC1jIHxATVGDr

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\3a263e37a9c4c62f0174069fa483ee9e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3a263e37a9c4c62f0174069fa483ee9e_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3928
        • C:\Windows\SysWOW64\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\~71D4.txt
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1692
        • C:\Users\Admin\AppData\Local\Temp\~732D.exe
          "C:\Users\Admin\AppData\Local\Temp\~732D.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~71D4.txt

      Filesize

      8B

      MD5

      d7fd6da488113962ee38a6956164c999

      SHA1

      3a16a925ca8708005c91e30f60acaa7e8e7a4d5f

      SHA256

      a9117a9097e9fec238f56937bab2807f5679298b186b8637fb5a6f9c655f73ad

      SHA512

      3f381adc2f4d5192761c38eef5b75a41cc4ae3abf066b19ffbf831662a1c89ba6530aa9867b503cb1855f239b9cc0a1a8d8e58568d552ab474b12282987e4c47

    • C:\Users\Admin\AppData\Local\Temp\~732D.exe

      Filesize

      9KB

      MD5

      38a616e6db15e1af0ff2359d2bc2d717

      SHA1

      34ce02f4327b062824fd7872ca06e5beba58eab4

      SHA256

      f8d8b14393d4e7c3485b4639ebf850c810c746ee445696d98608653e7ea2f96b

      SHA512

      ad20f552f7ce6191ab00aa78d569d4499414b097dbc834722f28e1ce2cf33ae81317a225ea653ea94eac4f86c5fd8a5f92c3bec9fc90ad6d5c276980e4d55961

    • memory/1168-13-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3928-9-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB