Analysis

  • max time kernel
    141s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 17:58

General

  • Target

    4149d336e083226da6016be0d9368a93_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    4149d336e083226da6016be0d9368a93

  • SHA1

    355f6fa389157d12317980ed496e9877cfe8fc44

  • SHA256

    c17ec25fc6bdacdf623ee5a12df624960a93fb960ca0d5e59bf96b96f2e9774f

  • SHA512

    d2383ccb237e84319c0e8d4a0f97a49eda54fb85b0929dea72154bc29ce0d8bdbea065921e635aacf6dc28cfb1e9770cbd5403c25aa72a4743c5654d50270f91

  • SSDEEP

    1536:0wLD8sK0m3aHUMwLZmJQZImZEt6Nxe5HCG0aeGs+TzINW:0wjmK0lZmJQZLqt3HTcGse2W

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4149d336e083226da6016be0d9368a93_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4149d336e083226da6016be0d9368a93_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\nsvA00B.tmp\[keygen].exe
      "C:\Users\Admin\AppData\Local\Temp\nsvA00B.tmp\[keygen].exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:464
    • C:\Users\Admin\AppData\Local\Temp\nsvA00B.tmp\Apps.exe
      "C:\Users\Admin\AppData\Local\Temp\nsvA00B.tmp\Apps.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsvA00B.tmp\Apps.exe

    Filesize

    25KB

    MD5

    262ab7059eca899ec709afa145774428

    SHA1

    9f3a4333b0e2c9cd31cf1adf65505b3a5da673c3

    SHA256

    34d67910148a1c46bc1cf1309836e7966c75c1e1cef844d4b80c9a55a533624b

    SHA512

    36112a63e2f0a5118c8c35ca92467d9aa87bea93b66af6441a34ef3f14df3dd2c1ba74639f3792c5cc7fa3e48b736bf068a929ed2a8bbe5648839d63b4155abb

  • C:\Users\Admin\AppData\Local\Temp\nsvA00B.tmp\[keygen].exe

    Filesize

    19KB

    MD5

    51ca1d13699ac5176985b9dcf312277b

    SHA1

    50cf7d35b59da26089c0fb2f2ec6eca44e20d89b

    SHA256

    40596071422b95fc5c24662ffd40e61b0072b11ab4d8bbba65f2d74708c7b825

    SHA512

    345703325c0bda40d057a039a184b368c95709283feef3a7cecc3ea50aad5cada33d00c7d415c2dae400ae57a83cb17aa9413a07f233a585134d278a270a8389

  • memory/464-8-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/464-21-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2200-22-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB