Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 01:20

General

  • Target

    45209d8c312d7e56bde93c021a939106_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    45209d8c312d7e56bde93c021a939106

  • SHA1

    3ef6b55a3b92785d6e806dc33361f2dab2cbf21a

  • SHA256

    01cef117b8b86566d8e9149c2b26b1c2ced4accff6b23775da41fd69c6ab57d3

  • SHA512

    6710532207cc440f3c9ba8e0dd279a72096234e0b955cef34769c5a3f5d4d7416cc3ba87202a38de268c3e57a536fcfa0eb656b6f3f8ad22b8ca76694f09c698

  • SSDEEP

    1536:vH1yoL0uHZaofQMT3BaaEayyXngC05yY2ibA2VphkE58:tsuHZagQYaaEzy3yz/VpaE58

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45209d8c312d7e56bde93c021a939106_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45209d8c312d7e56bde93c021a939106_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\ieudinit.exe
      C:\Users\Admin\AppData\Local\Temp\ieudinit.exe /waitservice
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ieudinit.exe

    Filesize

    92KB

    MD5

    45209d8c312d7e56bde93c021a939106

    SHA1

    3ef6b55a3b92785d6e806dc33361f2dab2cbf21a

    SHA256

    01cef117b8b86566d8e9149c2b26b1c2ced4accff6b23775da41fd69c6ab57d3

    SHA512

    6710532207cc440f3c9ba8e0dd279a72096234e0b955cef34769c5a3f5d4d7416cc3ba87202a38de268c3e57a536fcfa0eb656b6f3f8ad22b8ca76694f09c698